diff options
author | David Gwynne <dlg@cvs.openbsd.org> | 2016-04-02 08:49:50 +0000 |
---|---|---|
committer | David Gwynne <dlg@cvs.openbsd.org> | 2016-04-02 08:49:50 +0000 |
commit | e5a0d0d70b99ccd066229eef52ecb6861bdc7f8e (patch) | |
tree | 467c8ba025beabaae6fe3b4d2c4c3eed8c4a3523 /sys/net/bpf.c | |
parent | 1205b031a9ad9ffbd73b76f455e3bcf03051352d (diff) |
refactor bpf_filter a bit.
the code was confusing around how it dealt with packets in mbufs
vs plain memory buffers with a lenght.
this renames bpf_filter to _bpf_filter, and changes it so the packet
memory is referred to by an opaque pointer, and callers have to
provide a set of operations to extra values from that opaque pointer.
bpf_filter is now provided as a wrapper around _bpf_filter. it
provides a set of operators that work on a straight buffer with a
lenght.
this also adds a bpf_mfilter function which takes an mbuf instead
of a buffer, and it provides explicit operations for extracting
values from mbufs.
if we want to use bpf filters against other data structures (usb
or scsi packets maybe?) we are able to provide functions for
extracting payloads from them and use _bpf_filter as is.
ok canacar@
Diffstat (limited to 'sys/net/bpf.c')
-rw-r--r-- | sys/net/bpf.c | 106 |
1 files changed, 103 insertions, 3 deletions
diff --git a/sys/net/bpf.c b/sys/net/bpf.c index 639f3a4133c..6842dfe4ca7 100644 --- a/sys/net/bpf.c +++ b/sys/net/bpf.c @@ -1,4 +1,4 @@ -/* $OpenBSD: bpf.c,v 1.137 2016/03/30 12:33:10 dlg Exp $ */ +/* $OpenBSD: bpf.c,v 1.138 2016/04/02 08:49:49 dlg Exp $ */ /* $NetBSD: bpf.c,v 1.33 1997/02/21 23:59:35 thorpej Exp $ */ /* @@ -1152,7 +1152,7 @@ bpf_tap(caddr_t arg, u_char *pkt, u_int pktlen, u_int direction) bf = srp_enter(&d->bd_rfilter); if (bf != NULL) fcode = bf->bf_insns; - slen = bpf_filter(fcode, pkt, pktlen, 0); + slen = bpf_filter(fcode, pkt, pktlen, pktlen); srp_leave(&d->bd_rfilter, bf); } @@ -1244,7 +1244,7 @@ _bpf_mtap(caddr_t arg, struct mbuf *m, u_int direction, bf = srp_enter(&d->bd_rfilter); if (bf != NULL) fcode = bf->bf_insns; - slen = bpf_filter(fcode, (u_char *)m, pktlen, 0); + slen = bpf_mfilter(fcode, m, pktlen); srp_leave(&d->bd_rfilter, bf); } @@ -1739,3 +1739,103 @@ bpf_insn_dtor(void *null, void *f) free(insns, M_DEVBUF, bf->bf_len * sizeof(*insns)); free(bf, M_DEVBUF, sizeof(*bf)); } + +u_int32_t bpf_mbuf_ldw(const void *, u_int32_t, int *); +u_int32_t bpf_mbuf_ldh(const void *, u_int32_t, int *); +u_int32_t bpf_mbuf_ldb(const void *, u_int32_t, int *); + +int bpf_mbuf_copy(const struct mbuf *, u_int32_t, + void *, u_int32_t); + +const struct bpf_ops bpf_mbuf_ops = { + bpf_mbuf_ldw, + bpf_mbuf_ldh, + bpf_mbuf_ldb, +}; + +int +bpf_mbuf_copy(const struct mbuf *m, u_int32_t off, void *buf, u_int32_t len) +{ + u_int8_t *cp = buf; + u_int32_t count; + + while (off >= m->m_len) { + off -= m->m_len; + + m = m->m_next; + if (m == NULL) + return (-1); + } + + for (;;) { + count = min(m->m_len - off, len); + + memcpy(cp, m->m_data + off, count); + len -= count; + + if (len == 0) + return (0); + + m = m->m_next; + if (m == NULL) + break; + + cp += count; + off = 0; + } + + return (-1); +} + +u_int32_t +bpf_mbuf_ldw(const void *m0, u_int32_t k, int *err) +{ + u_int32_t v; + + if (bpf_mbuf_copy(m0, k, &v, sizeof(v)) != 0) { + *err = 1; + return (0); + } + + *err = 0; + return ntohl(v); +} + +u_int32_t +bpf_mbuf_ldh(const void *m0, u_int32_t k, int *err) +{ + u_int16_t v; + + if (bpf_mbuf_copy(m0, k, &v, sizeof(v)) != 0) { + *err = 1; + return (0); + } + + *err = 0; + return ntohs(v); +} + +u_int32_t +bpf_mbuf_ldb(const void *m0, u_int32_t k, int *err) +{ + const struct mbuf *m = m0; + + while (k >= m->m_len) { + k -= m->m_len; + + m = m->m_next; + if (m == NULL) { + *err = 1; + return (0); + } + } + + *err = 0; + return (m->m_data[k]); +} + +u_int +bpf_mfilter(const struct bpf_insn *pc, const struct mbuf *m, u_int wirelen) +{ + return _bpf_filter(pc, &bpf_mbuf_ops, m, wirelen); +} |