Fix buildkernel when pfsync(4) is compiled into an x86_64 kernel.
[dragonfly.git] / sys / net / pf / if_pfsync.c
... / ...
CommitLineData
1/* $OpenBSD: if_pfsync.c,v 1.73 2006/11/16 13:13:38 henning Exp $ */
2
3/*
4 * Copyright (c) 2002 Michael Shalayeff
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19 * IN NO EVENT SHALL THE AUTHOR OR HIS RELATIVES BE LIABLE FOR ANY DIRECT,
20 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
21 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
22 * SERVICES; LOSS OF MIND, USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
24 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
25 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
26 * THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29#include "opt_inet.h"
30#include "opt_inet6.h"
31#include "use_carp.h"
32
33#include <sys/param.h>
34#include <sys/endian.h>
35#include <sys/proc.h>
36#include <sys/priv.h>
37#include <sys/systm.h>
38#include <sys/time.h>
39#include <sys/mbuf.h>
40#include <sys/socket.h>
41#include <sys/kernel.h>
42#include <sys/malloc.h>
43#include <sys/module.h>
44#include <sys/sockio.h>
45#include <sys/thread2.h>
46#include <vm/vm_zone.h>
47
48#include <machine/inttypes.h>
49
50#include <net/if.h>
51#include <net/if_types.h>
52#include <net/route.h>
53#include <net/bpf.h>
54#include <netinet/in.h>
55#include <netinet/if_ether.h>
56#include <netinet/ip_carp.h>
57#include <netinet/tcp.h>
58#include <netinet/tcp_seq.h>
59
60#ifdef INET
61#include <netinet/in_systm.h>
62#include <netinet/in_var.h>
63#include <netinet/ip.h>
64#include <netinet/ip_var.h>
65#endif
66
67#ifdef INET6
68#include <netinet6/nd6.h>
69#endif /* INET6 */
70
71#include <net/pf/pfvar.h>
72#include <net/pf/if_pfsync.h>
73
74#define PFSYNCNAME "pfsync"
75
76#define PFSYNC_MINMTU \
77 (sizeof(struct pfsync_header) + sizeof(struct pf_state))
78
79#ifdef PFSYNCDEBUG
80#define DPRINTF(x) do { if (pfsyncdebug) kprintf x ; } while (0)
81int pfsyncdebug;
82#else
83#define DPRINTF(x)
84#endif
85
86struct pfsync_softc *pfsyncif = NULL;
87struct pfsyncstats pfsyncstats;
88
89void pfsyncattach(int);
90static void pfsync_clone_destroy(struct ifnet *);
91static int pfsync_clone_create(struct if_clone *, int, caddr_t);
92void pfsync_setmtu(struct pfsync_softc *, int);
93int pfsync_alloc_scrub_memory(struct pfsync_state_peer *,
94 struct pf_state_peer *);
95int pfsync_insert_net_state(struct pfsync_state *, u_int8_t);
96int pfsyncoutput(struct ifnet *, struct mbuf *, struct sockaddr *,
97 struct rtentry *);
98int pfsyncioctl(struct ifnet *, u_long, caddr_t, struct ucred *);
99void pfsyncstart(struct ifnet *);
100
101struct mbuf *pfsync_get_mbuf(struct pfsync_softc *, u_int8_t, void **);
102int pfsync_request_update(struct pfsync_state_upd *, struct in_addr *);
103int pfsync_sendout(struct pfsync_softc *);
104int pfsync_sendout_mbuf(struct pfsync_softc *, struct mbuf *);
105void pfsync_timeout(void *);
106void pfsync_send_bus(struct pfsync_softc *, u_int8_t);
107void pfsync_bulk_update(void *);
108void pfsync_bulkfail(void *);
109
110static MALLOC_DEFINE(M_PFSYNC, PFSYNCNAME, "Packet Filter State Sync. Interface");
111static LIST_HEAD(pfsync_list, pfsync_softc) pfsync_list;
112
113int pfsync_sync_ok;
114
115struct if_clone pfsync_cloner =
116 IF_CLONE_INITIALIZER("pfsync", pfsync_clone_create, pfsync_clone_destroy, 1 ,1);
117
118void
119pfsyncattach(int npfsync)
120{
121 if_clone_attach(&pfsync_cloner);
122}
123static int
124pfsync_clone_create(struct if_clone *ifc, int unit, caddr_t param __unused)
125{
126 struct pfsync_softc *sc;
127 struct ifnet *ifp;
128
129 lwkt_gettoken(&pf_token);
130
131 MALLOC(sc, struct pfsync_softc *, sizeof(*sc), M_PFSYNC,
132 M_WAITOK|M_ZERO);
133
134 pfsync_sync_ok = 1;
135 sc->sc_mbuf = NULL;
136 sc->sc_mbuf_net = NULL;
137 sc->sc_mbuf_tdb = NULL;
138 sc->sc_statep.s = NULL;
139 sc->sc_statep_net.s = NULL;
140 sc->sc_statep_tdb.t = NULL;
141 sc->sc_maxupdates = 128;
142 sc->sc_sync_peer.s_addr =htonl(INADDR_PFSYNC_GROUP);
143 sc->sc_sendaddr.s_addr = htonl(INADDR_PFSYNC_GROUP);
144 sc->sc_ureq_received = 0;
145 sc->sc_ureq_sent = 0;
146 sc->sc_bulk_send_next = NULL;
147 sc->sc_bulk_terminator = NULL;
148
149 lwkt_reltoken(&pf_token);
150 ifp = &sc->sc_if;
151 ksnprintf(ifp->if_xname, sizeof ifp->if_xname, "pfsync%d", unit);
152 if_initname(ifp, ifc->ifc_name, unit);
153 ifp->if_ioctl = pfsyncioctl;
154 ifp->if_output = pfsyncoutput;
155 ifp->if_start = pfsyncstart;
156 ifp->if_type = IFT_PFSYNC;
157 ifp->if_snd.ifq_maxlen = ifqmaxlen;
158 ifp->if_hdrlen = PFSYNC_HDRLEN;
159 ifp->if_baudrate = IF_Mbps(100);
160 ifp->if_softc = sc;
161 pfsync_setmtu(sc, MCLBYTES);
162 callout_init(&sc->sc_tmo);
163 callout_init(&sc->sc_tdb_tmo);
164 callout_init(&sc->sc_bulk_tmo);
165 callout_init(&sc->sc_bulkfail_tmo);
166 if_attach(&sc->sc_if, NULL);
167
168 LIST_INSERT_HEAD(&pfsync_list, sc, sc_next);
169 bpfattach(&sc->sc_if, DLT_PFSYNC, PFSYNC_HDRLEN);
170
171#if NCARP > 0
172 if_addgroup(ifp, "carp");
173#endif
174 lwkt_gettoken(&pf_token);
175
176 lwkt_reltoken(&pf_token);
177 return (0);
178}
179
180static void
181pfsync_clone_destroy(struct ifnet *ifp)
182{
183 lwkt_gettoken(&pf_token);
184 lwkt_reltoken(&pf_token);
185#if NBPFILTER > 0
186 bpfdetach(ifp);
187#endif
188 if_detach(ifp);
189 lwkt_gettoken(&pf_token);
190 kfree(pfsyncif, M_DEVBUF);
191 pfsyncif = NULL;
192}
193
194/*
195 * Start output on the pfsync interface.
196 */
197void
198pfsyncstart(struct ifnet *ifp)
199{
200 crit_enter();
201 IF_DROP(&ifp->if_snd);
202 IF_DRAIN(&ifp->if_snd);
203 crit_exit();
204}
205
206int
207pfsync_alloc_scrub_memory(struct pfsync_state_peer *s,
208 struct pf_state_peer *d)
209{
210 if (s->scrub.scrub_flag && d->scrub == NULL) {
211 d->scrub = pool_get(&pf_state_scrub_pl, PR_NOWAIT);
212 if (d->scrub == NULL)
213 return (ENOMEM);
214 bzero(d->scrub, sizeof(*d->scrub));
215 }
216
217 return (0);
218}
219
220int
221pfsync_insert_net_state(struct pfsync_state *sp, u_int8_t chksum_flag)
222{
223 struct pf_state *st = NULL;
224 struct pf_state_key *sk = NULL;
225 struct pf_rule *r = NULL;
226 struct pfi_kif *kif;
227
228 if (sp->creatorid == 0 && pf_status.debug >= PF_DEBUG_MISC) {
229 kprintf("pfsync_insert_net_state: invalid creator id:"
230 " %08x\n", ntohl(sp->creatorid));
231 return (EINVAL);
232 }
233
234 kif = pfi_kif_get(sp->ifname);
235 if (kif == NULL) {
236 if (pf_status.debug >= PF_DEBUG_MISC)
237 kprintf("pfsync_insert_net_state: "
238 "unknown interface: %s\n", sp->ifname);
239 /* skip this state */
240 return (0);
241 }
242
243 /*
244 * If the ruleset checksums match, it's safe to associate the state
245 * with the rule of that number.
246 */
247 if (sp->rule != htonl(-1) && sp->anchor == htonl(-1) && chksum_flag &&
248 ntohl(sp->rule) <
249 pf_main_ruleset.rules[PF_RULESET_FILTER].active.rcount)
250 r = pf_main_ruleset.rules[
251 PF_RULESET_FILTER].active.ptr_array[ntohl(sp->rule)];
252 else
253 r = &pf_default_rule;
254
255 if (!r->max_states || r->states < r->max_states)
256 st = pool_get(&pf_state_pl, PR_NOWAIT);
257 if (st == NULL) {
258 pfi_kif_unref(kif, PFI_KIF_REF_NONE);
259 return (ENOMEM);
260 }
261 bzero(st, sizeof(*st));
262
263 if ((sk = pf_alloc_state_key(st)) == NULL) {
264 pool_put(&pf_state_pl, st);
265 pfi_kif_unref(kif, PFI_KIF_REF_NONE);
266 return (ENOMEM);
267 }
268
269 /* allocate memory for scrub info */
270 if (pfsync_alloc_scrub_memory(&sp->src, &st->src) ||
271 pfsync_alloc_scrub_memory(&sp->dst, &st->dst)) {
272 pfi_kif_unref(kif, PFI_KIF_REF_NONE);
273 if (st->src.scrub)
274 pool_put(&pf_state_scrub_pl, st->src.scrub);
275 pool_put(&pf_state_pl, st);
276 pool_put(&pf_state_key_pl, sk);
277 return (ENOMEM);
278 }
279
280 st->rule.ptr = r;
281 /* XXX get pointers to nat_rule and anchor */
282
283 /* XXX when we have nat_rule/anchors, use STATE_INC_COUNTERS */
284 r->states++;
285
286 /* fill in the rest of the state entry */
287 pf_state_host_ntoh(&sp->lan, &sk->lan);
288 pf_state_host_ntoh(&sp->gwy, &sk->gwy);
289 pf_state_host_ntoh(&sp->ext, &sk->ext);
290
291 pf_state_peer_ntoh(&sp->src, &st->src);
292 pf_state_peer_ntoh(&sp->dst, &st->dst);
293
294 bcopy(&sp->rt_addr, &st->rt_addr, sizeof(st->rt_addr));
295 st->creation = time_second - ntohl(sp->creation);
296 st->expire = ntohl(sp->expire) + time_second;
297
298 sk->af = sp->af;
299 sk->proto = sp->proto;
300 sk->direction = sp->direction;
301 st->log = sp->log;
302 st->timeout = sp->timeout;
303 st->allow_opts = sp->allow_opts;
304
305 bcopy(sp->id, &st->id, sizeof(st->id));
306 st->creatorid = sp->creatorid;
307 st->sync_flags = PFSTATE_FROMSYNC;
308
309 if (pf_insert_state(kif, st)) {
310 pfi_kif_unref(kif, PFI_KIF_REF_NONE);
311 /* XXX when we have nat_rule/anchors, use STATE_DEC_COUNTERS */
312 r->states--;
313 if (st->dst.scrub)
314 pool_put(&pf_state_scrub_pl, st->dst.scrub);
315 if (st->src.scrub)
316 pool_put(&pf_state_scrub_pl, st->src.scrub);
317 pool_put(&pf_state_pl, st);
318 return (EINVAL);
319 }
320
321 return (0);
322}
323
324void
325pfsync_input(struct mbuf *m, ...)
326{
327 struct ip *ip = mtod(m, struct ip *);
328 struct pfsync_header *ph;
329 struct pfsync_softc *sc = pfsyncif;
330 struct pf_state *st;
331 struct pf_state_key *sk;
332 struct pf_state_cmp id_key;
333 struct pfsync_state *sp;
334 struct pfsync_state_upd *up;
335 struct pfsync_state_del *dp;
336 struct pfsync_state_clr *cp;
337 struct pfsync_state_upd_req *rup;
338 struct pfsync_state_bus *bus;
339#ifdef IPSEC
340 struct pfsync_tdb *pt;
341#endif
342 struct in_addr src;
343 struct mbuf *mp;
344 int iplen, action, error, i, count, offp, sfail, stale = 0;
345 u_int8_t chksum_flag = 0;
346
347 /* This function is not yet called from anywhere */
348 /* Still we assume for safety that pf_token must be held */
349 ASSERT_LWKT_TOKEN_HELD(&pf_token);
350
351 pfsyncstats.pfsyncs_ipackets++;
352
353 /* verify that we have a sync interface configured */
354 if (!sc || !sc->sc_sync_ifp || !pf_status.running)
355 goto done;
356
357 /* verify that the packet came in on the right interface */
358 if (sc->sc_sync_ifp != m->m_pkthdr.rcvif) {
359 pfsyncstats.pfsyncs_badif++;
360 goto done;
361 }
362
363 /* verify that the IP TTL is 255. */
364 if (ip->ip_ttl != PFSYNC_DFLTTL) {
365 pfsyncstats.pfsyncs_badttl++;
366 goto done;
367 }
368
369 iplen = ip->ip_hl << 2;
370
371 if (m->m_pkthdr.len < iplen + sizeof(*ph)) {
372 pfsyncstats.pfsyncs_hdrops++;
373 goto done;
374 }
375
376 if (iplen + sizeof(*ph) > m->m_len) {
377 if ((m = m_pullup(m, iplen + sizeof(*ph))) == NULL) {
378 pfsyncstats.pfsyncs_hdrops++;
379 goto done;
380 }
381 ip = mtod(m, struct ip *);
382 }
383 ph = (struct pfsync_header *)((char *)ip + iplen);
384
385 /* verify the version */
386 if (ph->version != PFSYNC_VERSION) {
387 pfsyncstats.pfsyncs_badver++;
388 goto done;
389 }
390
391 action = ph->action;
392 count = ph->count;
393
394 /* make sure it's a valid action code */
395 if (action >= PFSYNC_ACT_MAX) {
396 pfsyncstats.pfsyncs_badact++;
397 goto done;
398 }
399
400 /* Cheaper to grab this now than having to mess with mbufs later */
401 src = ip->ip_src;
402
403 if (!bcmp(&ph->pf_chksum, &pf_status.pf_chksum, PF_MD5_DIGEST_LENGTH))
404 chksum_flag++;
405
406 switch (action) {
407 case PFSYNC_ACT_CLR: {
408 struct pf_state *nexts;
409 struct pf_state_key *nextsk;
410 struct pfi_kif *kif;
411 u_int32_t creatorid;
412 if ((mp = m_pulldown(m, iplen + sizeof(*ph),
413 sizeof(*cp), &offp)) == NULL) {
414 pfsyncstats.pfsyncs_badlen++;
415 return;
416 }
417 cp = (struct pfsync_state_clr *)(mp->m_data + offp);
418 creatorid = cp->creatorid;
419
420 crit_enter();
421 if (cp->ifname[0] == '\0') {
422 for (st = RB_MIN(pf_state_tree_id, &tree_id);
423 st; st = nexts) {
424 nexts = RB_NEXT(pf_state_tree_id, &tree_id, st);
425 if (st->creatorid == creatorid) {
426 st->sync_flags |= PFSTATE_FROMSYNC;
427 pf_unlink_state(st);
428 }
429 }
430 } else {
431 if ((kif = pfi_kif_get(cp->ifname)) == NULL) {
432 crit_exit();
433 return;
434 }
435 for (sk = RB_MIN(pf_state_tree_lan_ext,
436 &pf_statetbl_lan_ext); sk; sk = nextsk) {
437 nextsk = RB_NEXT(pf_state_tree_lan_ext,
438 &pf_statetbl_lan_ext, sk);
439 TAILQ_FOREACH(st, &sk->states, next) {
440 if (st->creatorid == creatorid) {
441 st->sync_flags |=
442 PFSTATE_FROMSYNC;
443 pf_unlink_state(st);
444 }
445 }
446 }
447 }
448 crit_exit();
449
450 break;
451 }
452 case PFSYNC_ACT_INS:
453 if ((mp = m_pulldown(m, iplen + sizeof(*ph),
454 count * sizeof(*sp), &offp)) == NULL) {
455 pfsyncstats.pfsyncs_badlen++;
456 return;
457 }
458
459 crit_enter();
460 for (i = 0, sp = (struct pfsync_state *)(mp->m_data + offp);
461 i < count; i++, sp++) {
462 /* check for invalid values */
463 if (sp->timeout >= PFTM_MAX ||
464 sp->src.state > PF_TCPS_PROXY_DST ||
465 sp->dst.state > PF_TCPS_PROXY_DST ||
466 sp->direction > PF_OUT ||
467 (sp->af != AF_INET && sp->af != AF_INET6)) {
468 if (pf_status.debug >= PF_DEBUG_MISC)
469 kprintf("pfsync_insert: PFSYNC_ACT_INS: "
470 "invalid value\n");
471 pfsyncstats.pfsyncs_badstate++;
472 continue;
473 }
474
475 if ((error = pfsync_insert_net_state(sp,
476 chksum_flag))) {
477 if (error == ENOMEM) {
478 crit_exit();
479 goto done;
480 }
481 continue;
482 }
483 }
484 crit_exit();
485 break;
486 case PFSYNC_ACT_UPD:
487 if ((mp = m_pulldown(m, iplen + sizeof(*ph),
488 count * sizeof(*sp), &offp)) == NULL) {
489 pfsyncstats.pfsyncs_badlen++;
490 return;
491 }
492
493 crit_enter();
494 for (i = 0, sp = (struct pfsync_state *)(mp->m_data + offp);
495 i < count; i++, sp++) {
496 int flags = PFSYNC_FLAG_STALE;
497
498 /* check for invalid values */
499 if (sp->timeout >= PFTM_MAX ||
500 sp->src.state > PF_TCPS_PROXY_DST ||
501 sp->dst.state > PF_TCPS_PROXY_DST) {
502 if (pf_status.debug >= PF_DEBUG_MISC)
503 kprintf("pfsync_insert: PFSYNC_ACT_UPD: "
504 "invalid value\n");
505 pfsyncstats.pfsyncs_badstate++;
506 continue;
507 }
508
509 bcopy(sp->id, &id_key.id, sizeof(id_key.id));
510 id_key.creatorid = sp->creatorid;
511
512 st = pf_find_state_byid(&id_key);
513 if (st == NULL) {
514 /* insert the update */
515 if (pfsync_insert_net_state(sp, chksum_flag))
516 pfsyncstats.pfsyncs_badstate++;
517 continue;
518 }
519 sk = st->state_key;
520 sfail = 0;
521 if (sk->proto == IPPROTO_TCP) {
522 /*
523 * The state should never go backwards except
524 * for syn-proxy states. Neither should the
525 * sequence window slide backwards.
526 */
527 if (st->src.state > sp->src.state &&
528 (st->src.state < PF_TCPS_PROXY_SRC ||
529 sp->src.state >= PF_TCPS_PROXY_SRC))
530 sfail = 1;
531 else if (SEQ_GT(st->src.seqlo,
532 ntohl(sp->src.seqlo)))
533 sfail = 3;
534 else if (st->dst.state > sp->dst.state) {
535 /* There might still be useful
536 * information about the src state here,
537 * so import that part of the update,
538 * then "fail" so we send the updated
539 * state back to the peer who is missing
540 * our what we know. */
541 pf_state_peer_ntoh(&sp->src, &st->src);
542 /* XXX do anything with timeouts? */
543 sfail = 7;
544 flags = 0;
545 } else if (st->dst.state >= TCPS_SYN_SENT &&
546 SEQ_GT(st->dst.seqlo, ntohl(sp->dst.seqlo)))
547 sfail = 4;
548 } else {
549 /*
550 * Non-TCP protocol state machine always go
551 * forwards
552 */
553 if (st->src.state > sp->src.state)
554 sfail = 5;
555 else if (st->dst.state > sp->dst.state)
556 sfail = 6;
557 }
558 if (sfail) {
559 if (pf_status.debug >= PF_DEBUG_MISC)
560 kprintf("pfsync: %s stale update "
561 "(%d) id: %016jx "
562 "creatorid: %08x\n",
563 (sfail < 7 ? "ignoring"
564 : "partial"), sfail,
565 (uintmax_t)be64toh(st->id),
566 ntohl(st->creatorid));
567 pfsyncstats.pfsyncs_badstate++;
568
569 if (!(sp->sync_flags & PFSTATE_STALE)) {
570 /* we have a better state, send it */
571 if (sc->sc_mbuf != NULL && !stale)
572 pfsync_sendout(sc);
573 stale++;
574 if (!st->sync_flags)
575 pfsync_pack_state(
576 PFSYNC_ACT_UPD, st, flags);
577 }
578 continue;
579 }
580 pfsync_alloc_scrub_memory(&sp->dst, &st->dst);
581 pf_state_peer_ntoh(&sp->src, &st->src);
582 pf_state_peer_ntoh(&sp->dst, &st->dst);
583 st->expire = ntohl(sp->expire) + time_second;
584 st->timeout = sp->timeout;
585 }
586 if (stale && sc->sc_mbuf != NULL)
587 pfsync_sendout(sc);
588 crit_exit();
589 break;
590 /*
591 * It's not strictly necessary for us to support the "uncompressed"
592 * delete action, but it's relatively simple and maintains consistency.
593 */
594 case PFSYNC_ACT_DEL:
595 if ((mp = m_pulldown(m, iplen + sizeof(*ph),
596 count * sizeof(*sp), &offp)) == NULL) {
597 pfsyncstats.pfsyncs_badlen++;
598 return;
599 }
600
601 crit_enter();
602 for (i = 0, sp = (struct pfsync_state *)(mp->m_data + offp);
603 i < count; i++, sp++) {
604 bcopy(sp->id, &id_key.id, sizeof(id_key.id));
605 id_key.creatorid = sp->creatorid;
606
607 st = pf_find_state_byid(&id_key);
608 if (st == NULL) {
609 pfsyncstats.pfsyncs_badstate++;
610 continue;
611 }
612 st->sync_flags |= PFSTATE_FROMSYNC;
613 pf_unlink_state(st);
614 }
615 crit_exit();
616 break;
617 case PFSYNC_ACT_UPD_C: {
618 int update_requested = 0;
619
620 if ((mp = m_pulldown(m, iplen + sizeof(*ph),
621 count * sizeof(*up), &offp)) == NULL) {
622 pfsyncstats.pfsyncs_badlen++;
623 return;
624 }
625
626 crit_enter();
627 for (i = 0, up = (struct pfsync_state_upd *)(mp->m_data + offp);
628 i < count; i++, up++) {
629 /* check for invalid values */
630 if (up->timeout >= PFTM_MAX ||
631 up->src.state > PF_TCPS_PROXY_DST ||
632 up->dst.state > PF_TCPS_PROXY_DST) {
633 if (pf_status.debug >= PF_DEBUG_MISC)
634 kprintf("pfsync_insert: "
635 "PFSYNC_ACT_UPD_C: "
636 "invalid value\n");
637 pfsyncstats.pfsyncs_badstate++;
638 continue;
639 }
640
641 bcopy(up->id, &id_key.id, sizeof(id_key.id));
642 id_key.creatorid = up->creatorid;
643
644 st = pf_find_state_byid(&id_key);
645 if (st == NULL) {
646 /* We don't have this state. Ask for it. */
647 error = pfsync_request_update(up, &src);
648 if (error == ENOMEM) {
649 crit_exit();
650 goto done;
651 }
652 update_requested = 1;
653 pfsyncstats.pfsyncs_badstate++;
654 continue;
655 }
656 sk = st->state_key;
657 sfail = 0;
658 if (sk->proto == IPPROTO_TCP) {
659 /*
660 * The state should never go backwards except
661 * for syn-proxy states. Neither should the
662 * sequence window slide backwards.
663 */
664 if (st->src.state > up->src.state &&
665 (st->src.state < PF_TCPS_PROXY_SRC ||
666 up->src.state >= PF_TCPS_PROXY_SRC))
667 sfail = 1;
668 else if (st->dst.state > up->dst.state)
669 sfail = 2;
670 else if (SEQ_GT(st->src.seqlo,
671 ntohl(up->src.seqlo)))
672 sfail = 3;
673 else if (st->dst.state >= TCPS_SYN_SENT &&
674 SEQ_GT(st->dst.seqlo, ntohl(up->dst.seqlo)))
675 sfail = 4;
676 } else {
677 /*
678 * Non-TCP protocol state machine always go
679 * forwards
680 */
681 if (st->src.state > up->src.state)
682 sfail = 5;
683 else if (st->dst.state > up->dst.state)
684 sfail = 6;
685 }
686 if (sfail) {
687 if (pf_status.debug >= PF_DEBUG_MISC)
688 kprintf("pfsync: ignoring stale update "
689 "(%d) id: %016llx "
690 "creatorid: %08x\n", sfail,
691 be64toh(st->id),
692 ntohl(st->creatorid));
693 pfsyncstats.pfsyncs_badstate++;
694
695 /* we have a better state, send it out */
696 if ((!stale || update_requested) &&
697 sc->sc_mbuf != NULL) {
698 pfsync_sendout(sc);
699 update_requested = 0;
700 }
701 stale++;
702 if (!st->sync_flags)
703 pfsync_pack_state(PFSYNC_ACT_UPD, st,
704 PFSYNC_FLAG_STALE);
705 continue;
706 }
707 pfsync_alloc_scrub_memory(&up->dst, &st->dst);
708 pf_state_peer_ntoh(&up->src, &st->src);
709 pf_state_peer_ntoh(&up->dst, &st->dst);
710 st->expire = ntohl(up->expire) + time_second;
711 st->timeout = up->timeout;
712 }
713 if ((update_requested || stale) && sc->sc_mbuf)
714 pfsync_sendout(sc);
715 crit_exit();
716 break;
717 }
718 case PFSYNC_ACT_DEL_C:
719 if ((mp = m_pulldown(m, iplen + sizeof(*ph),
720 count * sizeof(*dp), &offp)) == NULL) {
721 pfsyncstats.pfsyncs_badlen++;
722 return;
723 }
724
725 crit_enter();
726 for (i = 0, dp = (struct pfsync_state_del *)(mp->m_data + offp);
727 i < count; i++, dp++) {
728 bcopy(dp->id, &id_key.id, sizeof(id_key.id));
729 id_key.creatorid = dp->creatorid;
730
731 st = pf_find_state_byid(&id_key);
732 if (st == NULL) {
733 pfsyncstats.pfsyncs_badstate++;
734 continue;
735 }
736 st->sync_flags |= PFSTATE_FROMSYNC;
737 pf_unlink_state(st);
738 }
739 crit_exit();
740 break;
741 case PFSYNC_ACT_INS_F:
742 case PFSYNC_ACT_DEL_F:
743 /* not implemented */
744 break;
745 case PFSYNC_ACT_UREQ:
746 if ((mp = m_pulldown(m, iplen + sizeof(*ph),
747 count * sizeof(*rup), &offp)) == NULL) {
748 pfsyncstats.pfsyncs_badlen++;
749 return;
750 }
751
752 crit_enter();
753 if (sc->sc_mbuf != NULL)
754 pfsync_sendout(sc);
755 for (i = 0,
756 rup = (struct pfsync_state_upd_req *)(mp->m_data + offp);
757 i < count; i++, rup++) {
758 bcopy(rup->id, &id_key.id, sizeof(id_key.id));
759 id_key.creatorid = rup->creatorid;
760
761 if (id_key.id == 0 && id_key.creatorid == 0) {
762 sc->sc_ureq_received = mycpu->gd_time_seconds;
763 if (sc->sc_bulk_send_next == NULL)
764 sc->sc_bulk_send_next =
765 TAILQ_FIRST(&state_list);
766 sc->sc_bulk_terminator = sc->sc_bulk_send_next;
767 if (pf_status.debug >= PF_DEBUG_MISC)
768 kprintf("pfsync: received "
769 "bulk update request\n");
770 pfsync_send_bus(sc, PFSYNC_BUS_START);
771 lwkt_reltoken(&pf_token);
772 callout_reset(&sc->sc_bulk_tmo, 1 * hz,
773 pfsync_bulk_update,
774 LIST_FIRST(&pfsync_list));
775 lwkt_gettoken(&pf_token);
776 } else {
777 st = pf_find_state_byid(&id_key);
778 if (st == NULL) {
779 pfsyncstats.pfsyncs_badstate++;
780 continue;
781 }
782 if (!st->sync_flags)
783 pfsync_pack_state(PFSYNC_ACT_UPD,
784 st, 0);
785 }
786 }
787 if (sc->sc_mbuf != NULL)
788 pfsync_sendout(sc);
789 crit_exit();
790 break;
791 case PFSYNC_ACT_BUS:
792 /* If we're not waiting for a bulk update, who cares. */
793 if (sc->sc_ureq_sent == 0)
794 break;
795
796 if ((mp = m_pulldown(m, iplen + sizeof(*ph),
797 sizeof(*bus), &offp)) == NULL) {
798 pfsyncstats.pfsyncs_badlen++;
799 return;
800 }
801 bus = (struct pfsync_state_bus *)(mp->m_data + offp);
802 switch (bus->status) {
803 case PFSYNC_BUS_START:
804 lwkt_reltoken(&pf_token);
805 callout_reset(&sc->sc_bulkfail_tmo,
806 pf_pool_limits[PF_LIMIT_STATES].limit /
807 (PFSYNC_BULKPACKETS * sc->sc_maxcount),
808 pfsync_bulkfail, LIST_FIRST(&pfsync_list));
809 lwkt_gettoken(&pf_token);
810 if (pf_status.debug >= PF_DEBUG_MISC)
811 kprintf("pfsync: received bulk "
812 "update start\n");
813 break;
814 case PFSYNC_BUS_END:
815 if (mycpu->gd_time_seconds - ntohl(bus->endtime) >=
816 sc->sc_ureq_sent) {
817 /* that's it, we're happy */
818 sc->sc_ureq_sent = 0;
819 sc->sc_bulk_tries = 0;
820 lwkt_reltoken(&pf_token);
821 callout_stop(&sc->sc_bulkfail_tmo);
822 lwkt_gettoken(&pf_token);
823#if NCARP > 0
824 if (!pfsync_sync_ok) {
825 lwkt_reltoken(&pf_token);
826 carp_group_demote_adj(&sc->sc_if, -1);
827 lwkt_gettoken(&pf_token);
828 }
829#endif
830 pfsync_sync_ok = 1;
831 if (pf_status.debug >= PF_DEBUG_MISC)
832 kprintf("pfsync: received valid "
833 "bulk update end\n");
834 } else {
835 if (pf_status.debug >= PF_DEBUG_MISC)
836 kprintf("pfsync: received invalid "
837 "bulk update end: bad timestamp\n");
838 }
839 break;
840 }
841 break;
842#ifdef IPSEC
843 case PFSYNC_ACT_TDB_UPD:
844 if ((mp = m_pulldown(m, iplen + sizeof(*ph),
845 count * sizeof(*pt), &offp)) == NULL) {
846 pfsyncstats.pfsyncs_badlen++;
847 return;
848 }
849 crit_enter();
850 for (i = 0, pt = (struct pfsync_tdb *)(mp->m_data + offp);
851 i < count; i++, pt++)
852 pfsync_update_net_tdb(pt);
853 crit_exit();
854 break;
855#endif
856 }
857
858done:
859 if (m)
860 m_freem(m);
861}
862
863int
864pfsyncoutput(struct ifnet *ifp, struct mbuf *m, struct sockaddr *dst,
865 struct rtentry *rt)
866{
867 m_freem(m);
868 return (0);
869}
870
871/* ARGSUSED */
872int
873pfsyncioctl(struct ifnet *ifp, u_long cmd, caddr_t data, struct ucred *cr)
874{
875 struct pfsync_softc *sc = ifp->if_softc;
876 struct ifreq *ifr = (struct ifreq *)data;
877 struct ip_moptions *imo = &sc->sc_imo;
878 struct pfsyncreq pfsyncr;
879 struct ifnet *sifp;
880 int error;
881
882 lwkt_gettoken(&pf_token);
883
884 switch (cmd) {
885 case SIOCSIFADDR:
886 case SIOCAIFADDR:
887 case SIOCSIFDSTADDR:
888 case SIOCSIFFLAGS:
889 if (ifp->if_flags & IFF_UP)
890 ifp->if_flags |= IFF_RUNNING;
891 else
892 ifp->if_flags &= ~IFF_RUNNING;
893 break;
894 case SIOCSIFMTU:
895 if (ifr->ifr_mtu < PFSYNC_MINMTU) {
896 lwkt_reltoken(&pf_token);
897 return (EINVAL);
898 }
899 if (ifr->ifr_mtu > MCLBYTES)
900 ifr->ifr_mtu = MCLBYTES;
901 crit_enter();
902 if (ifr->ifr_mtu < ifp->if_mtu)
903 pfsync_sendout(sc);
904 pfsync_setmtu(sc, ifr->ifr_mtu);
905 crit_exit();
906 break;
907 case SIOCGETPFSYNC:
908 bzero(&pfsyncr, sizeof(pfsyncr));
909 if (sc->sc_sync_ifp)
910 strlcpy(pfsyncr.pfsyncr_syncdev,
911 sc->sc_sync_ifp->if_xname, IFNAMSIZ);
912 pfsyncr.pfsyncr_syncpeer = sc->sc_sync_peer;
913 pfsyncr.pfsyncr_maxupdates = sc->sc_maxupdates;
914 lwkt_reltoken(&pf_token);
915 if ((error = copyout(&pfsyncr, ifr->ifr_data, sizeof(pfsyncr))))
916 return (error);
917 lwkt_gettoken(&pf_token);
918 break;
919 case SIOCSETPFSYNC:
920 if ((error = priv_check_cred(cr, PRIV_ROOT, NULL_CRED_OKAY)) != 0) {
921 lwkt_reltoken(&pf_token);
922 return (error);
923 }
924 if ((error = copyin(ifr->ifr_data, &pfsyncr, sizeof(pfsyncr)))) {
925 lwkt_reltoken(&pf_token);
926 return (error);
927 }
928
929 if (pfsyncr.pfsyncr_syncpeer.s_addr == 0)
930 sc->sc_sync_peer.s_addr = INADDR_PFSYNC_GROUP;
931 else
932 sc->sc_sync_peer.s_addr =
933 pfsyncr.pfsyncr_syncpeer.s_addr;
934
935 if (pfsyncr.pfsyncr_maxupdates > 255) {
936 lwkt_reltoken(&pf_token);
937 return (EINVAL);
938 }
939 sc->sc_maxupdates = pfsyncr.pfsyncr_maxupdates;
940
941 if (pfsyncr.pfsyncr_syncdev[0] == 0) {
942 sc->sc_sync_ifp = NULL;
943 if (sc->sc_mbuf_net != NULL) {
944 /* Don't keep stale pfsync packets around. */
945 crit_enter();
946 m_freem(sc->sc_mbuf_net);
947 sc->sc_mbuf_net = NULL;
948 sc->sc_statep_net.s = NULL;
949 crit_exit();
950 }
951 if (imo->imo_num_memberships > 0) {
952 in_delmulti(imo->imo_membership[--imo->imo_num_memberships]);
953 imo->imo_multicast_ifp = NULL;
954 }
955 break;
956 }
957
958 if ((sifp = ifunit(pfsyncr.pfsyncr_syncdev)) == NULL) {
959 lwkt_reltoken(&pf_token);
960 return (EINVAL);
961 }
962
963 crit_enter();
964 if (sifp->if_mtu < sc->sc_if.if_mtu ||
965 (sc->sc_sync_ifp != NULL &&
966 sifp->if_mtu < sc->sc_sync_ifp->if_mtu) ||
967 sifp->if_mtu < MCLBYTES - sizeof(struct ip))
968 pfsync_sendout(sc);
969 sc->sc_sync_ifp = sifp;
970
971 pfsync_setmtu(sc, sc->sc_if.if_mtu);
972
973 if (imo->imo_num_memberships > 0) {
974 in_delmulti(imo->imo_membership[--imo->imo_num_memberships]);
975 imo->imo_multicast_ifp = NULL;
976 }
977
978 if (sc->sc_sync_ifp &&
979 sc->sc_sync_peer.s_addr == INADDR_PFSYNC_GROUP) {
980 struct in_addr addr;
981
982 if (!(sc->sc_sync_ifp->if_flags & IFF_MULTICAST)) {
983 sc->sc_sync_ifp = NULL;
984 lwkt_reltoken(&pf_token);
985 crit_exit();
986 return (EADDRNOTAVAIL);
987 }
988
989 addr.s_addr = INADDR_PFSYNC_GROUP;
990
991 if ((imo->imo_membership[0] =
992 in_addmulti(&addr, sc->sc_sync_ifp)) == NULL) {
993 sc->sc_sync_ifp = NULL;
994 lwkt_reltoken(&pf_token);
995 crit_exit();
996 return (ENOBUFS);
997 }
998 imo->imo_num_memberships++;
999 imo->imo_multicast_ifp = sc->sc_sync_ifp;
1000 imo->imo_multicast_ttl = PFSYNC_DFLTTL;
1001 imo->imo_multicast_loop = 0;
1002 }
1003
1004 if (sc->sc_sync_ifp ||
1005 sc->sc_sendaddr.s_addr != INADDR_PFSYNC_GROUP) {
1006 /* Request a full state table update. */
1007 sc->sc_ureq_sent = mycpu->gd_time_seconds;
1008#if NCARP > 0
1009 if (pfsync_sync_ok)
1010 carp_group_demote_adj(&sc->sc_if, 1);
1011#endif
1012 pfsync_sync_ok = 0;
1013 if (pf_status.debug >= PF_DEBUG_MISC)
1014 kprintf("pfsync: requesting bulk update\n");
1015 lwkt_reltoken(&pf_token);
1016 callout_reset(&sc->sc_bulkfail_tmo, 5 * hz,
1017 pfsync_bulkfail, LIST_FIRST(&pfsync_list));
1018 lwkt_gettoken(&pf_token);
1019 error = pfsync_request_update(NULL, NULL);
1020 if (error == ENOMEM) {
1021 lwkt_reltoken(&pf_token);
1022 crit_exit();
1023 return (ENOMEM);
1024 }
1025 pfsync_sendout(sc);
1026 }
1027 crit_exit();
1028
1029 break;
1030
1031 default:
1032 lwkt_reltoken(&pf_token);
1033 return (ENOTTY);
1034 }
1035
1036 lwkt_reltoken(&pf_token);
1037 return (0);
1038}
1039
1040void
1041pfsync_setmtu(struct pfsync_softc *sc, int mtu_req)
1042{
1043 int mtu;
1044
1045 if (sc->sc_sync_ifp && sc->sc_sync_ifp->if_mtu < mtu_req)
1046 mtu = sc->sc_sync_ifp->if_mtu;
1047 else
1048 mtu = mtu_req;
1049
1050 sc->sc_maxcount = (mtu - sizeof(struct pfsync_header)) /
1051 sizeof(struct pfsync_state);
1052 if (sc->sc_maxcount > 254)
1053 sc->sc_maxcount = 254;
1054 sc->sc_if.if_mtu = sizeof(struct pfsync_header) +
1055 sc->sc_maxcount * sizeof(struct pfsync_state);
1056}
1057
1058struct mbuf *
1059pfsync_get_mbuf(struct pfsync_softc *sc, u_int8_t action, void **sp)
1060{
1061 struct pfsync_header *h;
1062 struct mbuf *m;
1063 int len;
1064
1065 ASSERT_LWKT_TOKEN_HELD(&pf_token);
1066
1067 MGETHDR(m, M_WAITOK, MT_DATA);
1068 if (m == NULL) {
1069 sc->sc_if.if_oerrors++;
1070 return (NULL);
1071 }
1072
1073 switch (action) {
1074 case PFSYNC_ACT_CLR:
1075 len = sizeof(struct pfsync_header) +
1076 sizeof(struct pfsync_state_clr);
1077 break;
1078 case PFSYNC_ACT_UPD_C:
1079 len = (sc->sc_maxcount * sizeof(struct pfsync_state_upd)) +
1080 sizeof(struct pfsync_header);
1081 break;
1082 case PFSYNC_ACT_DEL_C:
1083 len = (sc->sc_maxcount * sizeof(struct pfsync_state_del)) +
1084 sizeof(struct pfsync_header);
1085 break;
1086 case PFSYNC_ACT_UREQ:
1087 len = (sc->sc_maxcount * sizeof(struct pfsync_state_upd_req)) +
1088 sizeof(struct pfsync_header);
1089 break;
1090 case PFSYNC_ACT_BUS:
1091 len = sizeof(struct pfsync_header) +
1092 sizeof(struct pfsync_state_bus);
1093 break;
1094 case PFSYNC_ACT_TDB_UPD:
1095 len = (sc->sc_maxcount * sizeof(struct pfsync_tdb)) +
1096 sizeof(struct pfsync_header);
1097 break;
1098 default:
1099 len = (sc->sc_maxcount * sizeof(struct pfsync_state)) +
1100 sizeof(struct pfsync_header);
1101 break;
1102 }
1103
1104 if (len > MHLEN) {
1105 MCLGET(m, M_WAITOK);
1106 if ((m->m_flags & M_EXT) == 0) {
1107 m_free(m);
1108 sc->sc_if.if_oerrors++;
1109 return (NULL);
1110 }
1111 m->m_data += (MCLBYTES - len) &~ (sizeof(long) - 1);
1112 } else
1113 MH_ALIGN(m, len);
1114
1115 m->m_pkthdr.rcvif = NULL;
1116 m->m_pkthdr.len = m->m_len = sizeof(struct pfsync_header);
1117 h = mtod(m, struct pfsync_header *);
1118 h->version = PFSYNC_VERSION;
1119 h->af = 0;
1120 h->count = 0;
1121 h->action = action;
1122
1123 *sp = (void *)((char *)h + PFSYNC_HDRLEN);
1124 lwkt_reltoken(&pf_token);
1125 callout_reset(&sc->sc_tmo, hz, pfsync_timeout,
1126 LIST_FIRST(&pfsync_list));
1127 lwkt_gettoken(&pf_token);
1128 return (m);
1129}
1130
1131int
1132pfsync_pack_state(u_int8_t action, struct pf_state *st, int flags)
1133{
1134 struct ifnet *ifp = NULL;
1135 struct pfsync_softc *sc = pfsyncif;
1136 struct pfsync_header *h, *h_net;
1137 struct pfsync_state *sp = NULL;
1138 struct pfsync_state_upd *up = NULL;
1139 struct pfsync_state_del *dp = NULL;
1140 struct pf_state_key *sk = st->state_key;
1141 struct pf_rule *r;
1142 u_long secs;
1143 int ret = 0;
1144 u_int8_t i = 255, newaction = 0;
1145
1146 if (sc == NULL)
1147 return (0);
1148 ifp = &sc->sc_if;
1149
1150 /*
1151 * If a packet falls in the forest and there's nobody around to
1152 * hear, does it make a sound?
1153 */
1154 if (ifp->if_bpf == NULL && sc->sc_sync_ifp == NULL &&
1155 sc->sc_sync_peer.s_addr == INADDR_PFSYNC_GROUP) {
1156 /* Don't leave any stale pfsync packets hanging around. */
1157 if (sc->sc_mbuf != NULL) {
1158 m_freem(sc->sc_mbuf);
1159 sc->sc_mbuf = NULL;
1160 sc->sc_statep.s = NULL;
1161 }
1162 return (0);
1163 }
1164
1165 if (action >= PFSYNC_ACT_MAX)
1166 return (EINVAL);
1167
1168 crit_enter();
1169 if (sc->sc_mbuf == NULL) {
1170 if ((sc->sc_mbuf = pfsync_get_mbuf(sc, action,
1171 (void *)&sc->sc_statep.s)) == NULL) {
1172 crit_exit();
1173 return (ENOMEM);
1174 }
1175 h = mtod(sc->sc_mbuf, struct pfsync_header *);
1176 } else {
1177 h = mtod(sc->sc_mbuf, struct pfsync_header *);
1178 if (h->action != action) {
1179 pfsync_sendout(sc);
1180 if ((sc->sc_mbuf = pfsync_get_mbuf(sc, action,
1181 (void *)&sc->sc_statep.s)) == NULL) {
1182 crit_exit();
1183 return (ENOMEM);
1184 }
1185 h = mtod(sc->sc_mbuf, struct pfsync_header *);
1186 } else {
1187 /*
1188 * If it's an update, look in the packet to see if
1189 * we already have an update for the state.
1190 */
1191 if (action == PFSYNC_ACT_UPD && sc->sc_maxupdates) {
1192 struct pfsync_state *usp =
1193 (void *)((char *)h + PFSYNC_HDRLEN);
1194
1195 for (i = 0; i < h->count; i++) {
1196 if (!memcmp(usp->id, &st->id,
1197 PFSYNC_ID_LEN) &&
1198 usp->creatorid == st->creatorid) {
1199 sp = usp;
1200 sp->updates++;
1201 break;
1202 }
1203 usp++;
1204 }
1205 }
1206 }
1207 }
1208
1209 secs = time_second;
1210
1211 st->pfsync_time = mycpu->gd_time_seconds;;
1212
1213 if (sp == NULL) {
1214 /* not a "duplicate" update */
1215 i = 255;
1216 sp = sc->sc_statep.s++;
1217 sc->sc_mbuf->m_pkthdr.len =
1218 sc->sc_mbuf->m_len += sizeof(struct pfsync_state);
1219 h->count++;
1220 bzero(sp, sizeof(*sp));
1221
1222 bcopy(&st->id, sp->id, sizeof(sp->id));
1223 sp->creatorid = st->creatorid;
1224
1225 strlcpy(sp->ifname, st->kif->pfik_name, sizeof(sp->ifname));
1226 pf_state_host_hton(&sk->lan, &sp->lan);
1227 pf_state_host_hton(&sk->gwy, &sp->gwy);
1228 pf_state_host_hton(&sk->ext, &sp->ext);
1229
1230 bcopy(&st->rt_addr, &sp->rt_addr, sizeof(sp->rt_addr));
1231
1232 sp->creation = htonl(secs - st->creation);
1233 pf_state_counter_hton(st->packets[0], sp->packets[0]);
1234 pf_state_counter_hton(st->packets[1], sp->packets[1]);
1235 pf_state_counter_hton(st->bytes[0], sp->bytes[0]);
1236 pf_state_counter_hton(st->bytes[1], sp->bytes[1]);
1237 if ((r = st->rule.ptr) == NULL)
1238 sp->rule = htonl(-1);
1239 else
1240 sp->rule = htonl(r->nr);
1241 if ((r = st->anchor.ptr) == NULL)
1242 sp->anchor = htonl(-1);
1243 else
1244 sp->anchor = htonl(r->nr);
1245 sp->af = sk->af;
1246 sp->proto = sk->proto;
1247 sp->direction = sk->direction;
1248 sp->log = st->log;
1249 sp->allow_opts = st->allow_opts;
1250 sp->timeout = st->timeout;
1251
1252 if (flags & PFSYNC_FLAG_STALE)
1253 sp->sync_flags |= PFSTATE_STALE;
1254 }
1255
1256 pf_state_peer_hton(&st->src, &sp->src);
1257 pf_state_peer_hton(&st->dst, &sp->dst);
1258
1259 if (st->expire <= secs)
1260 sp->expire = htonl(0);
1261 else
1262 sp->expire = htonl(st->expire - secs);
1263
1264 /* do we need to build "compressed" actions for network transfer? */
1265 if (sc->sc_sync_ifp && flags & PFSYNC_FLAG_COMPRESS) {
1266 switch (action) {
1267 case PFSYNC_ACT_UPD:
1268 newaction = PFSYNC_ACT_UPD_C;
1269 break;
1270 case PFSYNC_ACT_DEL:
1271 newaction = PFSYNC_ACT_DEL_C;
1272 break;
1273 default:
1274 /* by default we just send the uncompressed states */
1275 break;
1276 }
1277 }
1278
1279 if (newaction) {
1280 if (sc->sc_mbuf_net == NULL) {
1281 if ((sc->sc_mbuf_net = pfsync_get_mbuf(sc, newaction,
1282 (void *)&sc->sc_statep_net.s)) == NULL) {
1283 crit_exit();
1284 return (ENOMEM);
1285 }
1286 }
1287 h_net = mtod(sc->sc_mbuf_net, struct pfsync_header *);
1288
1289 switch (newaction) {
1290 case PFSYNC_ACT_UPD_C:
1291 if (i != 255) {
1292 up = (void *)((char *)h_net +
1293 PFSYNC_HDRLEN + (i * sizeof(*up)));
1294 up->updates++;
1295 } else {
1296 h_net->count++;
1297 sc->sc_mbuf_net->m_pkthdr.len =
1298 sc->sc_mbuf_net->m_len += sizeof(*up);
1299 up = sc->sc_statep_net.u++;
1300
1301 bzero(up, sizeof(*up));
1302 bcopy(&st->id, up->id, sizeof(up->id));
1303 up->creatorid = st->creatorid;
1304 }
1305 up->timeout = st->timeout;
1306 up->expire = sp->expire;
1307 up->src = sp->src;
1308 up->dst = sp->dst;
1309 break;
1310 case PFSYNC_ACT_DEL_C:
1311 sc->sc_mbuf_net->m_pkthdr.len =
1312 sc->sc_mbuf_net->m_len += sizeof(*dp);
1313 dp = sc->sc_statep_net.d++;
1314 h_net->count++;
1315
1316 bzero(dp, sizeof(*dp));
1317 bcopy(&st->id, dp->id, sizeof(dp->id));
1318 dp->creatorid = st->creatorid;
1319 break;
1320 }
1321 }
1322
1323 if (h->count == sc->sc_maxcount ||
1324 (sc->sc_maxupdates && (sp->updates >= sc->sc_maxupdates)))
1325 ret = pfsync_sendout(sc);
1326
1327 crit_exit();
1328 return (ret);
1329}
1330
1331int
1332pfsync_request_update(struct pfsync_state_upd *up, struct in_addr *src)
1333{
1334 struct ifnet *ifp = NULL;
1335 struct pfsync_header *h;
1336 struct pfsync_softc *sc = pfsyncif;
1337 struct pfsync_state_upd_req *rup;
1338 int ret = 0;
1339
1340 if (sc == NULL)
1341 return (0);
1342
1343 ifp = &sc->sc_if;
1344 if (sc->sc_mbuf == NULL) {
1345 if ((sc->sc_mbuf = pfsync_get_mbuf(sc, PFSYNC_ACT_UREQ,
1346 (void *)&sc->sc_statep.s)) == NULL)
1347 return (ENOMEM);
1348 h = mtod(sc->sc_mbuf, struct pfsync_header *);
1349 } else {
1350 h = mtod(sc->sc_mbuf, struct pfsync_header *);
1351 if (h->action != PFSYNC_ACT_UREQ) {
1352 pfsync_sendout(sc);
1353 if ((sc->sc_mbuf = pfsync_get_mbuf(sc, PFSYNC_ACT_UREQ,
1354 (void *)&sc->sc_statep.s)) == NULL)
1355 return (ENOMEM);
1356 h = mtod(sc->sc_mbuf, struct pfsync_header *);
1357 }
1358 }
1359
1360 if (src != NULL)
1361 sc->sc_sendaddr = *src;
1362 sc->sc_mbuf->m_pkthdr.len = sc->sc_mbuf->m_len += sizeof(*rup);
1363 h->count++;
1364 rup = sc->sc_statep.r++;
1365 bzero(rup, sizeof(*rup));
1366 if (up != NULL) {
1367 bcopy(up->id, rup->id, sizeof(rup->id));
1368 rup->creatorid = up->creatorid;
1369 }
1370
1371 if (h->count == sc->sc_maxcount)
1372 ret = pfsync_sendout(sc);
1373
1374 return (ret);
1375}
1376
1377int
1378pfsync_clear_states(u_int32_t creatorid, char *ifname)
1379{
1380 struct ifnet *ifp = NULL;
1381 struct pfsync_softc *sc = pfsyncif;
1382 struct pfsync_state_clr *cp;
1383 int ret;
1384
1385 if (sc == NULL)
1386 return (0);
1387
1388 ifp = &sc->sc_if;
1389 crit_enter();
1390 if (sc->sc_mbuf != NULL)
1391 pfsync_sendout(sc);
1392 if ((sc->sc_mbuf = pfsync_get_mbuf(sc, PFSYNC_ACT_CLR,
1393 (void *)&sc->sc_statep.c)) == NULL) {
1394 crit_exit();
1395 return (ENOMEM);
1396 }
1397 sc->sc_mbuf->m_pkthdr.len = sc->sc_mbuf->m_len += sizeof(*cp);
1398 cp = sc->sc_statep.c;
1399 cp->creatorid = creatorid;
1400 if (ifname != NULL)
1401 strlcpy(cp->ifname, ifname, IFNAMSIZ);
1402
1403 ret = (pfsync_sendout(sc));
1404 crit_exit();
1405 return (ret);
1406}
1407
1408void
1409pfsync_timeout(void *v)
1410{
1411 struct pfsync_softc *sc = v;
1412
1413 crit_enter();
1414 pfsync_sendout(sc);
1415 crit_exit();
1416}
1417
1418void
1419pfsync_send_bus(struct pfsync_softc *sc, u_int8_t status)
1420{
1421 struct pfsync_state_bus *bus;
1422
1423 if (sc->sc_mbuf != NULL)
1424 pfsync_sendout(sc);
1425
1426 if (pfsync_sync_ok &&
1427 (sc->sc_mbuf = pfsync_get_mbuf(sc, PFSYNC_ACT_BUS,
1428 (void *)&sc->sc_statep.b)) != NULL) {
1429 sc->sc_mbuf->m_pkthdr.len = sc->sc_mbuf->m_len += sizeof(*bus);
1430 bus = sc->sc_statep.b;
1431 bus->creatorid = pf_status.hostid;
1432 bus->status = status;
1433 bus->endtime = htonl(mycpu->gd_time_seconds - sc->sc_ureq_received);
1434 pfsync_sendout(sc);
1435 }
1436}
1437
1438void
1439pfsync_bulk_update(void *v)
1440{
1441 struct pfsync_softc *sc = v;
1442 int i = 0;
1443 struct pf_state *state;
1444
1445 ASSERT_LWKT_TOKEN_HELD(&pf_token);
1446
1447 crit_enter();
1448 if (sc->sc_mbuf != NULL)
1449 pfsync_sendout(sc);
1450
1451 /*
1452 * Grab at most PFSYNC_BULKPACKETS worth of states which have not
1453 * been sent since the latest request was made.
1454 */
1455 state = sc->sc_bulk_send_next;
1456 if (state)
1457 do {
1458 /* send state update if syncable and not already sent */
1459 if (!state->sync_flags
1460 && state->timeout < PFTM_MAX
1461 && state->pfsync_time <= sc->sc_ureq_received) {
1462 pfsync_pack_state(PFSYNC_ACT_UPD, state, 0);
1463 i++;
1464 }
1465
1466 /* figure next state to send */
1467 state = TAILQ_NEXT(state, entry_list);
1468
1469 /* wrap to start of list if we hit the end */
1470 if (!state)
1471 state = TAILQ_FIRST(&state_list);
1472 } while (i < sc->sc_maxcount * PFSYNC_BULKPACKETS &&
1473 state != sc->sc_bulk_terminator);
1474
1475 if (!state || state == sc->sc_bulk_terminator) {
1476 /* we're done */
1477 pfsync_send_bus(sc, PFSYNC_BUS_END);
1478 sc->sc_ureq_received = 0;
1479 sc->sc_bulk_send_next = NULL;
1480 sc->sc_bulk_terminator = NULL;
1481 lwkt_reltoken(&pf_token);
1482 callout_stop(&sc->sc_bulk_tmo);
1483 lwkt_gettoken(&pf_token);
1484 if (pf_status.debug >= PF_DEBUG_MISC)
1485 kprintf("pfsync: bulk update complete\n");
1486 } else {
1487 /* look again for more in a bit */
1488 lwkt_reltoken(&pf_token);
1489 callout_reset(&sc->sc_bulk_tmo, 1, pfsync_timeout,
1490 LIST_FIRST(&pfsync_list));
1491 lwkt_gettoken(&pf_token);
1492 sc->sc_bulk_send_next = state;
1493 }
1494 if (sc->sc_mbuf != NULL)
1495 pfsync_sendout(sc);
1496 crit_exit();
1497}
1498
1499void
1500pfsync_bulkfail(void *v)
1501{
1502 struct pfsync_softc *sc = v;
1503 int error;
1504
1505 ASSERT_LWKT_TOKEN_HELD(&pf_token);
1506
1507 if (sc->sc_bulk_tries++ < PFSYNC_MAX_BULKTRIES) {
1508 /* Try again in a bit */
1509 lwkt_reltoken(&pf_token);
1510 callout_reset(&sc->sc_bulkfail_tmo, 5 * hz, pfsync_bulkfail,
1511 LIST_FIRST(&pfsync_list));
1512 lwkt_gettoken(&pf_token);
1513 crit_enter();
1514 error = pfsync_request_update(NULL, NULL);
1515 if (error == ENOMEM) {
1516 if (pf_status.debug >= PF_DEBUG_MISC)
1517 kprintf("pfsync: cannot allocate mbufs for "
1518 "bulk update\n");
1519 } else
1520 pfsync_sendout(sc);
1521 crit_exit();
1522 } else {
1523 /* Pretend like the transfer was ok */
1524 sc->sc_ureq_sent = 0;
1525 sc->sc_bulk_tries = 0;
1526#if NCARP > 0
1527 if (!pfsync_sync_ok)
1528 carp_group_demote_adj(&sc->sc_if, -1);
1529#endif
1530 pfsync_sync_ok = 1;
1531 if (pf_status.debug >= PF_DEBUG_MISC)
1532 kprintf("pfsync: failed to receive "
1533 "bulk update status\n");
1534 lwkt_reltoken(&pf_token);
1535 callout_stop(&sc->sc_bulkfail_tmo);
1536 lwkt_gettoken(&pf_token);
1537 }
1538}
1539
1540/* This must be called in splnet() */
1541int
1542pfsync_sendout(struct pfsync_softc *sc)
1543{
1544#if NBPFILTER > 0
1545 struct ifnet *ifp = &sc->sc_if;
1546#endif
1547 struct mbuf *m;
1548
1549 ASSERT_LWKT_TOKEN_HELD(&pf_token);
1550
1551 lwkt_reltoken(&pf_token);
1552 callout_stop(&sc->sc_tmo);
1553 lwkt_gettoken(&pf_token);
1554
1555 if (sc->sc_mbuf == NULL)
1556 return (0);
1557 m = sc->sc_mbuf;
1558 sc->sc_mbuf = NULL;
1559 sc->sc_statep.s = NULL;
1560
1561#if NBPFILTER > 0
1562 if (ifp->if_bpf) {
1563 lwkt_reltoken(&pf_token);
1564 bpf_mtap(ifp->if_bpf, m, BPF_DIRECTION_OUT);
1565 lwkt_gettoken(&pf_token);
1566 }
1567#endif
1568
1569 if (sc->sc_mbuf_net) {
1570 m_freem(m);
1571 m = sc->sc_mbuf_net;
1572 sc->sc_mbuf_net = NULL;
1573 sc->sc_statep_net.s = NULL;
1574 }
1575
1576 return pfsync_sendout_mbuf(sc, m);
1577}
1578
1579int
1580pfsync_sendout_mbuf(struct pfsync_softc *sc, struct mbuf *m)
1581{
1582 struct sockaddr sa;
1583 struct ip *ip;
1584
1585 if (sc->sc_sync_ifp ||
1586 sc->sc_sync_peer.s_addr != INADDR_PFSYNC_GROUP) {
1587 M_PREPEND(m, sizeof(struct ip), M_WAITOK);
1588 if (m == NULL) {
1589 pfsyncstats.pfsyncs_onomem++;
1590 return (0);
1591 }
1592 ip = mtod(m, struct ip *);
1593 ip->ip_v = IPVERSION;
1594 ip->ip_hl = sizeof(*ip) >> 2;
1595 ip->ip_tos = IPTOS_LOWDELAY;
1596 ip->ip_len = htons(m->m_pkthdr.len);
1597 ip->ip_id = htons(ip_randomid());
1598 ip->ip_off = htons(IP_DF);
1599 ip->ip_ttl = PFSYNC_DFLTTL;
1600 ip->ip_p = IPPROTO_PFSYNC;
1601 ip->ip_sum = 0;
1602
1603 bzero(&sa, sizeof(sa));
1604 ip->ip_src.s_addr = INADDR_ANY;
1605
1606 if (sc->sc_sendaddr.s_addr == INADDR_PFSYNC_GROUP)
1607 m->m_flags |= M_MCAST;
1608 ip->ip_dst = sc->sc_sendaddr;
1609 sc->sc_sendaddr.s_addr = sc->sc_sync_peer.s_addr;
1610
1611 pfsyncstats.pfsyncs_opackets++;
1612
1613 if (ip_output(m, NULL, NULL, IP_RAWOUTPUT, &sc->sc_imo, NULL))
1614 pfsyncstats.pfsyncs_oerrors++;
1615 } else
1616 m_freem(m);
1617
1618 return (0);
1619}
1620
1621static int
1622pfsync_modevent(module_t mod, int type, void *data)
1623{
1624 int error = 0;
1625
1626 lwkt_gettoken(&pf_token);
1627
1628 switch (type) {
1629 case MOD_LOAD:
1630 LIST_INIT(&pfsync_list);
1631 lwkt_reltoken(&pf_token);
1632 if_clone_attach(&pfsync_cloner);
1633 lwkt_gettoken(&pf_token);
1634 break;
1635
1636 case MOD_UNLOAD:
1637 lwkt_reltoken(&pf_token);
1638 if_clone_detach(&pfsync_cloner);
1639 lwkt_gettoken(&pf_token);
1640 while (!LIST_EMPTY(&pfsync_list))
1641 pfsync_clone_destroy(
1642 &LIST_FIRST(&pfsync_list)->sc_if);
1643 break;
1644
1645 default:
1646 error = EINVAL;
1647 break;
1648 }
1649
1650 lwkt_reltoken(&pf_token);
1651 return error;
1652}
1653
1654static moduledata_t pfsync_mod = {
1655 "pfsync",
1656 pfsync_modevent,
1657 0
1658};
1659
1660#define PFSYNC_MODVER 1
1661
1662DECLARE_MODULE(pfsync, pfsync_mod, SI_SUB_PSEUDO, SI_ORDER_ANY);
1663MODULE_VERSION(pfsync, PFSYNC_MODVER);
1664
1665
1666