1999-12-03 21:21:49 +00:00
|
|
|
.\" Copyright (c) 1999 Whistle Communications, Inc.
|
|
|
|
.\" All rights reserved.
|
2001-07-14 19:41:16 +00:00
|
|
|
.\"
|
1999-12-03 21:21:49 +00:00
|
|
|
.\" Subject to the following obligations and disclaimer of warranty, use and
|
|
|
|
.\" redistribution of this software, in source or object code forms, with or
|
|
|
|
.\" without modifications are expressly permitted by Whistle Communications;
|
|
|
|
.\" provided, however, that:
|
|
|
|
.\" 1. Any and all reproductions of the source or object code must include the
|
|
|
|
.\" copyright notice above and the following disclaimer of warranties; and
|
|
|
|
.\" 2. No rights are granted, in any manner or form, to use Whistle
|
|
|
|
.\" Communications, Inc. trademarks, including the mark "WHISTLE
|
|
|
|
.\" COMMUNICATIONS" on advertising, endorsements, or otherwise except as
|
|
|
|
.\" such appears in the above copyright notice or in the software.
|
2001-07-14 19:41:16 +00:00
|
|
|
.\"
|
1999-12-03 21:21:49 +00:00
|
|
|
.\" THIS SOFTWARE IS BEING PROVIDED BY WHISTLE COMMUNICATIONS "AS IS", AND
|
|
|
|
.\" TO THE MAXIMUM EXTENT PERMITTED BY LAW, WHISTLE COMMUNICATIONS MAKES NO
|
|
|
|
.\" REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, REGARDING THIS SOFTWARE,
|
|
|
|
.\" INCLUDING WITHOUT LIMITATION, ANY AND ALL IMPLIED WARRANTIES OF
|
|
|
|
.\" MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.
|
|
|
|
.\" WHISTLE COMMUNICATIONS DOES NOT WARRANT, GUARANTEE, OR MAKE ANY
|
|
|
|
.\" REPRESENTATIONS REGARDING THE USE OF, OR THE RESULTS OF THE USE OF THIS
|
|
|
|
.\" SOFTWARE IN TERMS OF ITS CORRECTNESS, ACCURACY, RELIABILITY OR OTHERWISE.
|
|
|
|
.\" IN NO EVENT SHALL WHISTLE COMMUNICATIONS BE LIABLE FOR ANY DAMAGES
|
|
|
|
.\" RESULTING FROM OR ARISING OUT OF ANY USE OF THIS SOFTWARE, INCLUDING
|
|
|
|
.\" WITHOUT LIMITATION, ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
|
|
|
|
.\" PUNITIVE, OR CONSEQUENTIAL DAMAGES, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
|
|
.\" SERVICES, LOSS OF USE, DATA OR PROFITS, HOWEVER CAUSED AND UNDER ANY
|
|
|
|
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
.\" THIS SOFTWARE, EVEN IF WHISTLE COMMUNICATIONS IS ADVISED OF THE POSSIBILITY
|
|
|
|
.\" OF SUCH DAMAGE.
|
2001-07-14 19:41:16 +00:00
|
|
|
.\"
|
2000-10-26 15:30:44 +00:00
|
|
|
.\" Author: Archie Cobbs <archie@FreeBSD.org>
|
1999-12-03 21:21:49 +00:00
|
|
|
.\"
|
|
|
|
.\" $FreeBSD$
|
|
|
|
.\" $Whistle: ng_bpf.8,v 1.2 1999/12/03 01:57:12 archie Exp $
|
|
|
|
.\"
|
|
|
|
.Dd December 2, 1999
|
2000-05-04 17:54:37 +00:00
|
|
|
.Dt NG_BPF 4
|
2001-07-10 15:31:11 +00:00
|
|
|
.Os
|
1999-12-03 21:21:49 +00:00
|
|
|
.Sh NAME
|
|
|
|
.Nm ng_bpf
|
|
|
|
.Nd Berkeley packet filter netgraph node type
|
|
|
|
.Sh SYNOPSIS
|
2001-10-01 16:09:29 +00:00
|
|
|
.In net/bpf.h
|
|
|
|
.In netgraph/ng_bpf.h
|
1999-12-03 21:21:49 +00:00
|
|
|
.Sh DESCRIPTION
|
|
|
|
The
|
|
|
|
.Nm bpf
|
|
|
|
node type allows Berkeley Packet Filter (see
|
1999-12-21 01:25:21 +00:00
|
|
|
.Xr bpf 4 )
|
1999-12-03 21:21:49 +00:00
|
|
|
filters to be applied to data travelling through a Netgraph network.
|
|
|
|
Each node allows an arbitrary number of connections to arbitrarily
|
2004-07-03 18:29:24 +00:00
|
|
|
named hooks.
|
|
|
|
With each hook is associated a
|
2000-12-29 09:18:45 +00:00
|
|
|
.Xr bpf 4
|
1999-12-03 21:21:49 +00:00
|
|
|
filter program which is applied to incoming data only, a destination hook
|
|
|
|
for matching packets, a destination hook for non-matching packets,
|
|
|
|
and various statistics counters.
|
|
|
|
.Pp
|
|
|
|
A
|
1999-12-21 01:25:21 +00:00
|
|
|
.Xr bpf 4
|
1999-12-03 21:21:49 +00:00
|
|
|
program returns an unsigned integer, which is normally interpreted as
|
2004-07-03 18:29:24 +00:00
|
|
|
the length of the prefix of the packet to return.
|
|
|
|
In the context of this
|
1999-12-03 21:21:49 +00:00
|
|
|
node type, returning zero is considered a non-match, in which case the
|
|
|
|
entire packet is delivered out the non-match destination hook.
|
|
|
|
Returning a value greater than zero causes the packet to be truncated
|
|
|
|
to that length and delivered out the match destination hook.
|
|
|
|
Either or both destination hooks may be the empty string, or may
|
|
|
|
not exist, in which case the packet is dropped.
|
|
|
|
.Pp
|
|
|
|
New hooks are initially configured to drop all packets.
|
2000-09-19 21:34:43 +00:00
|
|
|
A new filter program may be installed using the
|
|
|
|
.Dv NGM_BPF_SET_PROGRAM
|
1999-12-03 21:21:49 +00:00
|
|
|
control message.
|
|
|
|
.Sh HOOKS
|
|
|
|
This node type supports any number of hooks having arbitrary names.
|
|
|
|
.Sh CONTROL MESSAGES
|
|
|
|
This node type supports the generic control messages, plus the following:
|
|
|
|
.Bl -tag -width foo
|
2000-09-19 21:34:43 +00:00
|
|
|
.It Dv NGM_BPF_SET_PROGRAM
|
1999-12-03 21:21:49 +00:00
|
|
|
This command sets the filter program that will be applied to incoming
|
2004-07-03 18:29:24 +00:00
|
|
|
data on a hook.
|
|
|
|
The following structure must be supplied as an argument:
|
1999-12-03 21:21:49 +00:00
|
|
|
.Bd -literal -offset 4n
|
2001-03-30 20:32:05 +00:00
|
|
|
struct ng_bpf_hookprog {
|
2003-11-15 15:26:35 +00:00
|
|
|
char thisHook[NG_HOOKSIZ]; /* name of hook */
|
|
|
|
char ifMatch[NG_HOOKSIZ]; /* match dest hook */
|
|
|
|
char ifNotMatch[NG_HOOKSIZ]; /* !match dest hook */
|
1999-12-03 21:21:49 +00:00
|
|
|
int32_t bpf_prog_len; /* #isns in program */
|
|
|
|
struct bpf_insn bpf_prog[0]; /* bpf program */
|
|
|
|
};
|
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
The hook to be updated is specified in
|
|
|
|
.Dv thisHook .
|
|
|
|
The BPF program is the sequence of instructions in the
|
|
|
|
.Dv bpf_prog
|
|
|
|
array; there must be
|
|
|
|
.Dv bpf_prog_len
|
|
|
|
of them.
|
|
|
|
Matching and non-matching incoming packets are delivered out the hooks named
|
|
|
|
.Dv ifMatch
|
|
|
|
and
|
|
|
|
.Dv ifNotMatch ,
|
2004-07-03 18:29:24 +00:00
|
|
|
respectively.
|
|
|
|
The program must be a valid
|
1999-12-21 01:25:21 +00:00
|
|
|
.Xr bpf 4
|
1999-12-03 21:21:49 +00:00
|
|
|
program or else
|
|
|
|
.Er EINVAL
|
|
|
|
is returned.
|
2000-09-19 21:34:43 +00:00
|
|
|
.It Dv NGM_BPF_GET_PROGRAM
|
1999-12-21 01:25:21 +00:00
|
|
|
This command takes an
|
|
|
|
.Tn ASCII
|
|
|
|
string argument, the hook name, and returns the
|
1999-12-03 21:21:49 +00:00
|
|
|
corresponding
|
2001-03-30 20:32:05 +00:00
|
|
|
.Dv "struct ng_bpf_hookprog"
|
1999-12-03 21:21:49 +00:00
|
|
|
as shown above.
|
|
|
|
.It Dv NGM_BPF_GET_STATS
|
1999-12-21 01:25:21 +00:00
|
|
|
This command takes an
|
|
|
|
.Tn ASCII
|
|
|
|
string argument, the hook name, and returns the
|
1999-12-03 21:21:49 +00:00
|
|
|
statistics associated with the hook as a
|
|
|
|
.Dv "struct ng_bpf_hookstat" .
|
|
|
|
.It Dv NGM_BPF_CLR_STATS
|
1999-12-21 01:25:21 +00:00
|
|
|
This command takes an
|
|
|
|
.Tn ASCII
|
|
|
|
string argument, the hook name, and clears the
|
1999-12-03 21:21:49 +00:00
|
|
|
statistics associated with the hook.
|
|
|
|
.It Dv NGM_BPF_GETCLR_STATS
|
|
|
|
This command is identical to
|
|
|
|
.Dv NGM_BPF_GET_STATS ,
|
|
|
|
except that the statistics are also atomically cleared.
|
|
|
|
.El
|
|
|
|
.Sh SHUTDOWN
|
|
|
|
This node shuts down upon receipt of a
|
|
|
|
.Dv NGM_SHUTDOWN
|
|
|
|
control message, or when all hooks have been disconnected.
|
2001-02-19 10:49:15 +00:00
|
|
|
.Sh EXAMPLES
|
2001-02-19 04:00:52 +00:00
|
|
|
It is possible to configure a node from the command line, using
|
2001-07-14 19:41:16 +00:00
|
|
|
.Xr tcpdump 1
|
2001-02-19 04:00:52 +00:00
|
|
|
to generate raw BPF instructions which are then fed into an
|
|
|
|
.Xr awk 1
|
|
|
|
script to create the ASCII form of a
|
|
|
|
.Dv NGM_BPF_SET_PROGRAM
|
|
|
|
control message, as demonstrated here:
|
|
|
|
.Bd -literal -offset 4n
|
|
|
|
#!/bin/sh
|
|
|
|
|
|
|
|
PATTERN="tcp dst port 80"
|
2001-02-19 04:06:30 +00:00
|
|
|
NODEPATH="my_node:"
|
2001-02-19 04:00:52 +00:00
|
|
|
INHOOK="hook1"
|
|
|
|
MATCHHOOK="hook2"
|
|
|
|
NOTMATCHHOOK="hook3"
|
|
|
|
|
|
|
|
cat > /tmp/bpf.awk << xxENDxx
|
|
|
|
{
|
|
|
|
if (!init) {
|
|
|
|
printf "bpf_prog_len=%d bpf_prog=[", \\$1;
|
|
|
|
init=1;
|
|
|
|
} else {
|
|
|
|
printf " { code=%d jt=%d jf=%d k=%d }", \\$1, \\$2, \\$3, \\$4;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
END {
|
|
|
|
print " ]"
|
|
|
|
}
|
|
|
|
xxENDxx
|
|
|
|
|
2001-05-19 17:47:51 +00:00
|
|
|
BPFPROG=`tcpdump -s 8192 -ddd ${PATTERN} | awk -f /tmp/bpf.awk`
|
2001-02-19 04:00:52 +00:00
|
|
|
|
2001-02-19 04:06:30 +00:00
|
|
|
ngctl msg ${NODEPATH} setprogram { thisHook=\\"${INHOOK}\\" \\
|
2001-02-19 04:00:52 +00:00
|
|
|
ifMatch=\\"${MATCHHOOK}\\" \\
|
|
|
|
ifNotMatch=\\"${NOTMATCHHOOK}\\" \\
|
|
|
|
${BPFPROG} } }
|
|
|
|
.Ed
|
1999-12-03 21:21:49 +00:00
|
|
|
.Sh BUGS
|
|
|
|
When built as a loadable kernel module, this module includes the file
|
1999-12-21 01:25:21 +00:00
|
|
|
.Pa net/bpf_filter.c .
|
1999-12-03 21:21:49 +00:00
|
|
|
Although loading the module should fail if
|
1999-12-21 01:25:21 +00:00
|
|
|
.Pa net/bpf_filter.c
|
1999-12-03 21:21:49 +00:00
|
|
|
already exists in the kernel, currently it does not, and the duplicate
|
|
|
|
copies of the file do not interfere.
|
|
|
|
However, this may change in the future.
|
1999-12-21 01:25:21 +00:00
|
|
|
.Sh HISTORY
|
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
node type was implemented in
|
|
|
|
.Fx 4.0 .
|
1999-12-03 21:21:49 +00:00
|
|
|
.Sh SEE ALSO
|
|
|
|
.Xr bpf 4 ,
|
2001-07-06 16:46:48 +00:00
|
|
|
.Xr netgraph 4 ,
|
2000-05-04 17:54:37 +00:00
|
|
|
.Xr ngctl 8
|
1999-12-21 01:25:21 +00:00
|
|
|
.Sh AUTHORS
|
2000-10-26 15:30:44 +00:00
|
|
|
.An Archie Cobbs Aq archie@FreeBSD.org
|