1 /* $OpenBSD: if_pflog.c,v 1.24 2007/05/26 17:13:30 jason Exp $ */ 2 /* 3 * The authors of this code are John Ioannidis (ji@tla.org), 4 * Angelos D. Keromytis (kermit@csd.uch.gr) and 5 * Niels Provos (provos@physnet.uni-hamburg.de). 6 * 7 * This code was written by John Ioannidis for BSD/OS in Athens, Greece, 8 * in November 1995. 9 * 10 * Ported to OpenBSD and NetBSD, with additional transforms, in December 1996, 11 * by Angelos D. Keromytis. 12 * 13 * Additional transforms and features in 1997 and 1998 by Angelos D. Keromytis 14 * and Niels Provos. 15 * 16 * Copyright (C) 1995, 1996, 1997, 1998 by John Ioannidis, Angelos D. Keromytis 17 * and Niels Provos. 18 * Copyright (c) 2001, Angelos D. Keromytis, Niels Provos. 19 * 20 * Copyright (c) 2004 The DragonFly Project. All rights reserved. 21 * 22 * Permission to use, copy, and modify this software with or without fee 23 * is hereby granted, provided that this entire notice is included in 24 * all copies of any software which is or includes a copy or 25 * modification of this software. 26 * You may use this code under the GNU public license if you so wish. Please 27 * contribute changes back to the authors under this freer than GPL license 28 * so that we may further the use of strong encryption without limitations to 29 * all. 30 * 31 * THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR 32 * IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY 33 * REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE 34 * MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR 35 * PURPOSE. 36 */ 37 38 #include "opt_inet.h" 39 #include "opt_inet6.h" 40 41 #include <sys/param.h> 42 #include <sys/systm.h> 43 #include <sys/in_cksum.h> 44 #include <sys/mbuf.h> 45 #include <sys/proc.h> 46 #include <sys/socket.h> 47 #include <sys/kernel.h> 48 #include <sys/malloc.h> 49 #include <sys/module.h> 50 #include <sys/sockio.h> 51 #include <sys/thread2.h> 52 #include <vm/vm_zone.h> 53 54 #include <net/if.h> 55 #include <net/if_types.h> 56 #include <net/route.h> 57 #include <net/bpf.h> 58 59 #ifdef INET 60 #include <netinet/in.h> 61 #include <netinet/in_var.h> 62 #include <netinet/in_systm.h> 63 #include <netinet/ip.h> 64 #endif 65 66 #ifdef INET6 67 #ifndef INET 68 #include <netinet/in.h> 69 #endif 70 #include <netinet6/nd6.h> 71 #endif /* INET6 */ 72 73 #include <net/pf/pfvar.h> 74 #include <net/pf/if_pflog.h> 75 76 #define PFLOGNAME "pflog" 77 78 #define PFLOGMTU (32768 + MHLEN + MLEN) 79 80 #ifdef PFLOGDEBUG 81 #define DPRINTF(x) do { if (pflogdebug) kprintf x ; } while (0) 82 #else 83 #define DPRINTF(x) 84 #endif 85 86 void pflogattach(int); 87 int pflogoutput(struct ifnet *, struct mbuf *, struct sockaddr *, 88 struct rtentry *); 89 int pflogioctl(struct ifnet *, u_long, caddr_t, struct ucred *); 90 void pflogrtrequest(int, struct rtentry *, struct sockaddr *); 91 void pflogstart(struct ifnet *); 92 int pflog_clone_create(struct if_clone *, int, caddr_t); 93 int pflog_clone_destroy(struct ifnet *); 94 95 LIST_HEAD(, pflog_softc) pflogif_list; 96 struct if_clone pflog_cloner = 97 IF_CLONE_INITIALIZER("pflog", pflog_clone_create, pflog_clone_destroy, 1, 1); 98 99 struct ifnet *pflogifs[PFLOGIFS_MAX]; /* for fast access */ 100 101 void 102 pflogattach(int npflog) 103 { 104 int i; 105 LIST_INIT(&pflogif_list); 106 for (i = 0; i < PFLOGIFS_MAX; i++) 107 pflogifs[i] = NULL; 108 if_clone_attach(&pflog_cloner); 109 } 110 111 int 112 pflog_clone_create(struct if_clone *ifc, int unit, caddr_t param __unused) 113 { 114 struct ifnet *ifp; 115 struct pflog_softc *pflogif; 116 117 lwkt_gettoken(&pf_token); 118 119 if (unit >= PFLOGIFS_MAX) { 120 lwkt_reltoken(&pf_token); 121 return (EINVAL); 122 } 123 124 if ((pflogif = kmalloc(sizeof(*pflogif), M_DEVBUF, M_WAITOK)) == NULL) { 125 lwkt_reltoken(&pf_token); 126 return (ENOMEM); 127 } 128 bzero(pflogif, sizeof(*pflogif)); 129 130 pflogif->sc_unit = unit; 131 lwkt_reltoken(&pf_token); 132 ifp = &pflogif->sc_if; 133 ksnprintf(ifp->if_xname, sizeof ifp->if_xname, "pflog%d", unit); 134 ifp->if_softc = pflogif; 135 ifp->if_mtu = PFLOGMTU; 136 ifp->if_ioctl = pflogioctl; 137 ifp->if_output = pflogoutput; 138 ifp->if_start = pflogstart; 139 ifp->if_type = IFT_PFLOG; 140 ifp->if_snd.ifq_maxlen = ifqmaxlen; 141 ifp->if_hdrlen = PFLOG_HDRLEN; 142 if_attach(ifp, NULL); 143 144 bpfattach(&pflogif->sc_if, DLT_PFLOG, PFLOG_HDRLEN); 145 lwkt_gettoken(&pf_token); 146 147 crit_enter(); 148 LIST_INSERT_HEAD(&pflogif_list, pflogif, sc_list); 149 pflogifs[unit] = ifp; 150 crit_exit(); 151 152 lwkt_reltoken(&pf_token); 153 return (0); 154 } 155 156 int 157 pflog_clone_destroy(struct ifnet *ifp) 158 { 159 struct pflog_softc *pflogif = ifp->if_softc; 160 161 lwkt_gettoken(&pf_token); 162 163 crit_enter(); 164 pflogifs[pflogif->sc_unit] = NULL; 165 LIST_REMOVE(pflogif, sc_list); 166 crit_exit(); 167 168 lwkt_reltoken(&pf_token); 169 #if NBPFILTER > 0 170 bpfdetach(ifp); 171 #endif 172 if_detach(ifp); 173 lwkt_gettoken(&pf_token); 174 kfree(pflogif, M_DEVBUF); 175 lwkt_reltoken(&pf_token); 176 177 return 0; 178 } 179 180 /* 181 * Start output on the pflog interface. 182 */ 183 void 184 pflogstart(struct ifnet *ifp) 185 { 186 struct mbuf *m; 187 188 ASSERT_LWKT_TOKEN_HELD(&pf_token); 189 190 for (;;) { 191 lwkt_reltoken(&pf_token); 192 crit_enter(); 193 IF_DROP(&ifp->if_snd); 194 IF_DEQUEUE(&ifp->if_snd, m); 195 crit_exit(); 196 lwkt_gettoken(&pf_token); 197 198 if (m == NULL) 199 return; 200 else 201 m_freem(m); 202 } 203 } 204 205 int 206 pflogoutput(struct ifnet *ifp, struct mbuf *m, struct sockaddr *dst, 207 struct rtentry *rt) 208 { 209 m_freem(m); 210 return (0); 211 } 212 213 /* ARGSUSED */ 214 void 215 pflogrtrequest(int cmd, struct rtentry *rt, struct sockaddr *sa) 216 { 217 if (rt) 218 rt->rt_rmx.rmx_mtu = PFLOGMTU; 219 } 220 221 /* ARGSUSED */ 222 int 223 pflogioctl(struct ifnet *ifp, u_long cmd, caddr_t data, struct ucred *cr) 224 { 225 226 lwkt_gettoken(&pf_token); 227 228 switch (cmd) { 229 case SIOCSIFADDR: 230 case SIOCAIFADDR: 231 case SIOCSIFDSTADDR: 232 case SIOCSIFFLAGS: 233 lwkt_reltoken(&pf_token); 234 if (ifp->if_flags & IFF_UP) 235 ifp->if_flags |= IFF_RUNNING; 236 else 237 ifp->if_flags &= ~IFF_RUNNING; 238 lwkt_gettoken(&pf_token); 239 break; 240 default: 241 lwkt_reltoken(&pf_token); 242 return (EINVAL); 243 } 244 245 lwkt_reltoken(&pf_token); 246 return (0); 247 } 248 249 int 250 pflog_packet(struct pfi_kif *kif, struct mbuf *m, sa_family_t af, u_int8_t dir, 251 u_int8_t reason, struct pf_rule *rm, struct pf_rule *am, 252 struct pf_ruleset *ruleset, struct pf_pdesc *pd) 253 { 254 struct ifnet *ifn = NULL; 255 struct pfloghdr hdr; 256 257 ASSERT_LWKT_TOKEN_HELD(&pf_token); 258 259 if (kif == NULL || m == NULL || rm == NULL) 260 return (-1); 261 262 if ((ifn = pflogifs[rm->logif]) == NULL || !ifn->if_bpf) 263 return (0); 264 265 bzero(&hdr, sizeof(hdr)); 266 hdr.length = PFLOG_REAL_HDRLEN; 267 hdr.af = af; 268 hdr.action = rm->action; 269 hdr.reason = reason; 270 memcpy(hdr.ifname, kif->pfik_name, sizeof(hdr.ifname)); 271 272 if (am == NULL) { 273 hdr.rulenr = htonl(rm->nr); 274 hdr.subrulenr = -1; 275 } else { 276 hdr.rulenr = htonl(am->nr); 277 hdr.subrulenr = htonl(rm->nr); 278 if (ruleset != NULL && ruleset->anchor != NULL) 279 strlcpy(hdr.ruleset, ruleset->anchor->name, 280 sizeof(hdr.ruleset)); 281 } 282 if (rm->log & PF_LOG_SOCKET_LOOKUP && !pd->lookup.done) 283 pd->lookup.done = pf_socket_lookup(dir, pd); 284 if (pd->lookup.done > 0) { 285 hdr.uid = pd->lookup.uid; 286 hdr.pid = pd->lookup.pid; 287 } else { 288 hdr.uid = UID_MAX; 289 hdr.pid = NO_PID; 290 } 291 hdr.rule_uid = rm->cuid; 292 hdr.rule_pid = rm->cpid; 293 hdr.dir = dir; 294 295 #ifdef INET 296 if (af == AF_INET) { 297 struct ip *ip; 298 ip = mtod(m, struct ip *); 299 ip->ip_len = htons(ip->ip_len); 300 ip->ip_off = htons(ip->ip_off); 301 302 if (dir == PF_OUT) { 303 ip->ip_sum = 0; 304 ip->ip_sum = in_cksum(m, ip->ip_hl << 2); 305 } 306 } 307 #endif /* INET */ 308 309 ifn->if_opackets++; 310 ifn->if_obytes += m->m_pkthdr.len; 311 lwkt_reltoken(&pf_token); 312 bpf_mtap_hdr(ifn->if_bpf, (char *)&hdr, PFLOG_HDRLEN, m, 313 BPF_DIRECTION_OUT); 314 lwkt_gettoken(&pf_token); 315 316 #ifdef INET 317 if (af == AF_INET) { 318 struct ip *ip = mtod(m, struct ip *); 319 320 ip->ip_len = ntohs(ip->ip_len); 321 ip->ip_off = ntohs(ip->ip_off); 322 } 323 #endif /* INET */ 324 325 return (0); 326 } 327 328 static int 329 pflog_modevent(module_t mod, int type, void *data) 330 { 331 int error = 0; 332 333 lwkt_gettoken(&pf_token); 334 335 switch (type) { 336 case MOD_LOAD: 337 LIST_INIT(&pflogif_list); 338 lwkt_reltoken(&pf_token); 339 if_clone_attach(&pflog_cloner); 340 lwkt_gettoken(&pf_token); 341 break; 342 343 case MOD_UNLOAD: 344 lwkt_reltoken(&pf_token); 345 if_clone_detach(&pflog_cloner); 346 while (!LIST_EMPTY(&pflogif_list)) { 347 pflog_clone_destroy( 348 &LIST_FIRST(&pflogif_list)->sc_if); 349 } 350 lwkt_gettoken(&pf_token); 351 break; 352 353 default: 354 error = EINVAL; 355 break; 356 } 357 lwkt_reltoken(&pf_token); 358 return error; 359 } 360 361 static moduledata_t pflog_mod = { 362 "pflog", 363 pflog_modevent, 364 0 365 }; 366 367 #define PFLOG_MODVER 1 368 369 DECLARE_MODULE(pflog, pflog_mod, SI_SUB_PSEUDO, SI_ORDER_ANY); 370 MODULE_VERSION(pflog, PFLOG_MODVER); 371