tables.c revision 324791
1/*
2 * Copyright (c) 2014 Yandex LLC
3 * Copyright (c) 2014 Alexander V. Chernikov
4 *
5 * Redistribution and use in source forms, with and without modification,
6 * are permitted provided that this entire comment appears intact.
7 *
8 * Redistribution in binary form may occur without any restrictions.
9 * Obviously, it would be nice if you gave credit where credit is due
10 * but requiring it would be too onerous.
11 *
12 * This software is provided ``AS IS'' without any warranties of any kind.
13 *
14 * in-kernel ipfw tables support.
15 *
16 * $FreeBSD: stable/11/sbin/ipfw/tables.c 324791 2017-10-20 07:42:00Z ae $
17 */
18
19
20#include <sys/types.h>
21#include <sys/param.h>
22#include <sys/socket.h>
23#include <sys/sysctl.h>
24
25#include <ctype.h>
26#include <err.h>
27#include <errno.h>
28#include <netdb.h>
29#include <stdio.h>
30#include <stdlib.h>
31#include <string.h>
32#include <sysexits.h>
33
34#include <net/if.h>
35#include <netinet/in.h>
36#include <netinet/ip_fw.h>
37#include <arpa/inet.h>
38#include <netdb.h>
39
40#include "ipfw2.h"
41
42static void table_modify_record(ipfw_obj_header *oh, int ac, char *av[],
43    int add, int quiet, int update, int atomic);
44static int table_flush(ipfw_obj_header *oh);
45static int table_destroy(ipfw_obj_header *oh);
46static int table_do_create(ipfw_obj_header *oh, ipfw_xtable_info *i);
47static int table_do_modify(ipfw_obj_header *oh, ipfw_xtable_info *i);
48static int table_do_swap(ipfw_obj_header *oh, char *second);
49static void table_create(ipfw_obj_header *oh, int ac, char *av[]);
50static void table_modify(ipfw_obj_header *oh, int ac, char *av[]);
51static void table_lookup(ipfw_obj_header *oh, int ac, char *av[]);
52static void table_lock(ipfw_obj_header *oh, int lock);
53static int table_swap(ipfw_obj_header *oh, char *second);
54static int table_get_info(ipfw_obj_header *oh, ipfw_xtable_info *i);
55static int table_show_info(ipfw_xtable_info *i, void *arg);
56
57static int table_destroy_one(ipfw_xtable_info *i, void *arg);
58static int table_flush_one(ipfw_xtable_info *i, void *arg);
59static int table_show_one(ipfw_xtable_info *i, void *arg);
60static int table_do_get_list(ipfw_xtable_info *i, ipfw_obj_header **poh);
61static void table_show_list(ipfw_obj_header *oh, int need_header);
62static void table_show_entry(ipfw_xtable_info *i, ipfw_obj_tentry *tent);
63
64static void tentry_fill_key(ipfw_obj_header *oh, ipfw_obj_tentry *tent,
65    char *key, int add, uint8_t *ptype, uint32_t *pvmask, ipfw_xtable_info *xi);
66static void tentry_fill_value(ipfw_obj_header *oh, ipfw_obj_tentry *tent,
67    char *arg, uint8_t type, uint32_t vmask);
68static void table_show_value(char *buf, size_t bufsize, ipfw_table_value *v,
69    uint32_t vmask, int print_ip);
70
71typedef int (table_cb_t)(ipfw_xtable_info *i, void *arg);
72static int tables_foreach(table_cb_t *f, void *arg, int sort);
73
74#ifndef s6_addr32
75#define s6_addr32 __u6_addr.__u6_addr32
76#endif
77
78static struct _s_x tabletypes[] = {
79      { "addr",		IPFW_TABLE_ADDR },
80      { "iface",	IPFW_TABLE_INTERFACE },
81      { "number",	IPFW_TABLE_NUMBER },
82      { "flow",		IPFW_TABLE_FLOW },
83      { NULL, 0 }
84};
85
86static struct _s_x tablevaltypes[] = {
87      { "skipto",	IPFW_VTYPE_SKIPTO },
88      { "pipe",		IPFW_VTYPE_PIPE },
89      { "fib",		IPFW_VTYPE_FIB },
90      { "nat",		IPFW_VTYPE_NAT },
91      { "dscp",		IPFW_VTYPE_DSCP },
92      { "tag",		IPFW_VTYPE_TAG },
93      { "divert",	IPFW_VTYPE_DIVERT },
94      { "netgraph",	IPFW_VTYPE_NETGRAPH },
95      { "limit",	IPFW_VTYPE_LIMIT },
96      { "ipv4",		IPFW_VTYPE_NH4 },
97      { "ipv6",		IPFW_VTYPE_NH6 },
98      { NULL, 0 }
99};
100
101static struct _s_x tablecmds[] = {
102      { "add",		TOK_ADD },
103      { "delete",	TOK_DEL },
104      { "create",	TOK_CREATE },
105      { "destroy",	TOK_DESTROY },
106      { "flush",	TOK_FLUSH },
107      { "modify",	TOK_MODIFY },
108      { "swap",		TOK_SWAP },
109      { "info",		TOK_INFO },
110      { "detail",	TOK_DETAIL },
111      { "list",		TOK_LIST },
112      { "lookup",	TOK_LOOKUP },
113      { "atomic",	TOK_ATOMIC },
114      { "lock",		TOK_LOCK },
115      { "unlock",	TOK_UNLOCK },
116      { NULL, 0 }
117};
118
119static int
120lookup_host (char *host, struct in_addr *ipaddr)
121{
122	struct hostent *he;
123
124	if (!inet_aton(host, ipaddr)) {
125		if ((he = gethostbyname(host)) == NULL)
126			return(-1);
127		*ipaddr = *(struct in_addr *)he->h_addr_list[0];
128	}
129	return(0);
130}
131
132/*
133 * This one handles all table-related commands
134 * 	ipfw table NAME create ...
135 * 	ipfw table NAME modify ...
136 * 	ipfw table {NAME | all} destroy
137 * 	ipfw table NAME swap NAME
138 * 	ipfw table NAME lock
139 * 	ipfw table NAME unlock
140 * 	ipfw table NAME add addr[/masklen] [value]
141 * 	ipfw table NAME add [addr[/masklen] value] [addr[/masklen] value] ..
142 * 	ipfw table NAME delete addr[/masklen] [addr[/masklen]] ..
143 * 	ipfw table NAME lookup addr
144 * 	ipfw table {NAME | all} flush
145 * 	ipfw table {NAME | all} list
146 * 	ipfw table {NAME | all} info
147 * 	ipfw table {NAME | all} detail
148 */
149void
150ipfw_table_handler(int ac, char *av[])
151{
152	int do_add, is_all;
153	int atomic, error, tcmd;
154	ipfw_xtable_info i;
155	ipfw_obj_header oh;
156	char *tablename;
157	uint8_t set;
158	void *arg;
159
160	memset(&oh, 0, sizeof(oh));
161	is_all = 0;
162	if (co.use_set != 0)
163		set = co.use_set - 1;
164	else
165		set = 0;
166
167	ac--; av++;
168	NEED1("table needs name");
169	tablename = *av;
170
171	if (table_check_name(tablename) == 0) {
172		table_fill_ntlv(&oh.ntlv, *av, set, 1);
173		oh.idx = 1;
174	} else {
175		if (strcmp(tablename, "all") == 0)
176			is_all = 1;
177		else
178			errx(EX_USAGE, "table name %s is invalid", tablename);
179	}
180	ac--; av++;
181	NEED1("table needs command");
182
183	tcmd = get_token(tablecmds, *av, "table command");
184	/* Check if atomic operation was requested */
185	atomic = 0;
186	if (tcmd == TOK_ATOMIC) {
187		ac--; av++;
188		NEED1("atomic needs command");
189		tcmd = get_token(tablecmds, *av, "table command");
190		switch (tcmd) {
191		case TOK_ADD:
192			break;
193		default:
194			errx(EX_USAGE, "atomic is not compatible with %s", *av);
195		}
196		atomic = 1;
197	}
198
199	switch (tcmd) {
200	case TOK_LIST:
201	case TOK_INFO:
202	case TOK_DETAIL:
203	case TOK_FLUSH:
204	case TOK_DESTROY:
205		break;
206	default:
207		if (is_all != 0)
208			errx(EX_USAGE, "table name required");
209	}
210
211	switch (tcmd) {
212	case TOK_ADD:
213	case TOK_DEL:
214		do_add = **av == 'a';
215		ac--; av++;
216		table_modify_record(&oh, ac, av, do_add, co.do_quiet,
217		    co.do_quiet, atomic);
218		break;
219	case TOK_CREATE:
220		ac--; av++;
221		table_create(&oh, ac, av);
222		break;
223	case TOK_MODIFY:
224		ac--; av++;
225		table_modify(&oh, ac, av);
226		break;
227	case TOK_DESTROY:
228		if (is_all == 0) {
229			if (table_destroy(&oh) == 0)
230				break;
231			if (errno != ESRCH)
232				err(EX_OSERR, "failed to destroy table %s",
233				    tablename);
234			/* ESRCH isn't fatal, warn if not quiet mode */
235			if (co.do_quiet == 0)
236				warn("failed to destroy table %s", tablename);
237		} else {
238			error = tables_foreach(table_destroy_one, &oh, 1);
239			if (error != 0)
240				err(EX_OSERR,
241				    "failed to destroy tables list");
242		}
243		break;
244	case TOK_FLUSH:
245		if (is_all == 0) {
246			if ((error = table_flush(&oh)) == 0)
247				break;
248			if (errno != ESRCH)
249				err(EX_OSERR, "failed to flush table %s info",
250				    tablename);
251			/* ESRCH isn't fatal, warn if not quiet mode */
252			if (co.do_quiet == 0)
253				warn("failed to flush table %s info",
254				    tablename);
255		} else {
256			error = tables_foreach(table_flush_one, &oh, 1);
257			if (error != 0)
258				err(EX_OSERR, "failed to flush tables list");
259			/* XXX: we ignore errors here */
260		}
261		break;
262	case TOK_SWAP:
263		ac--; av++;
264		NEED1("second table name required");
265		table_swap(&oh, *av);
266		break;
267	case TOK_LOCK:
268	case TOK_UNLOCK:
269		table_lock(&oh, (tcmd == TOK_LOCK));
270		break;
271	case TOK_DETAIL:
272	case TOK_INFO:
273		arg = (tcmd == TOK_DETAIL) ? (void *)1 : NULL;
274		if (is_all == 0) {
275			if ((error = table_get_info(&oh, &i)) != 0)
276				err(EX_OSERR, "failed to request table info");
277			table_show_info(&i, arg);
278		} else {
279			error = tables_foreach(table_show_info, arg, 1);
280			if (error != 0)
281				err(EX_OSERR, "failed to request tables list");
282		}
283		break;
284	case TOK_LIST:
285		if (is_all == 0) {
286			ipfw_xtable_info i;
287			if ((error = table_get_info(&oh, &i)) != 0)
288				err(EX_OSERR, "failed to request table info");
289			table_show_one(&i, NULL);
290		} else {
291			error = tables_foreach(table_show_one, NULL, 1);
292			if (error != 0)
293				err(EX_OSERR, "failed to request tables list");
294		}
295		break;
296	case TOK_LOOKUP:
297		ac--; av++;
298		table_lookup(&oh, ac, av);
299		break;
300	}
301}
302
303void
304table_fill_ntlv(ipfw_obj_ntlv *ntlv, const char *name, uint8_t set,
305    uint16_t uidx)
306{
307
308	ntlv->head.type = IPFW_TLV_TBL_NAME;
309	ntlv->head.length = sizeof(ipfw_obj_ntlv);
310	ntlv->idx = uidx;
311	ntlv->set = set;
312	strlcpy(ntlv->name, name, sizeof(ntlv->name));
313}
314
315static void
316table_fill_objheader(ipfw_obj_header *oh, ipfw_xtable_info *i)
317{
318
319	oh->idx = 1;
320	table_fill_ntlv(&oh->ntlv, i->tablename, i->set, 1);
321}
322
323static struct _s_x tablenewcmds[] = {
324      { "type",		TOK_TYPE },
325      { "valtype",	TOK_VALTYPE },
326      { "algo",		TOK_ALGO },
327      { "limit",	TOK_LIMIT },
328      { "locked",	TOK_LOCK },
329      { NULL, 0 }
330};
331
332static struct _s_x flowtypecmds[] = {
333      { "src-ip",	IPFW_TFFLAG_SRCIP },
334      { "proto",	IPFW_TFFLAG_PROTO },
335      { "src-port",	IPFW_TFFLAG_SRCPORT },
336      { "dst-ip",	IPFW_TFFLAG_DSTIP },
337      { "dst-port",	IPFW_TFFLAG_DSTPORT },
338      { NULL, 0 }
339};
340
341int
342table_parse_type(uint8_t ttype, char *p, uint8_t *tflags)
343{
344	uint32_t fset, fclear;
345	char *e;
346
347	/* Parse type options */
348	switch(ttype) {
349	case IPFW_TABLE_FLOW:
350		fset = fclear = 0;
351		if (fill_flags(flowtypecmds, p, &e, &fset, &fclear) != 0)
352			errx(EX_USAGE,
353			    "unable to parse flow option %s", e);
354		*tflags = fset;
355		break;
356	default:
357		return (EX_USAGE);
358	}
359
360	return (0);
361}
362
363void
364table_print_type(char *tbuf, size_t size, uint8_t type, uint8_t tflags)
365{
366	const char *tname;
367	int l;
368
369	if ((tname = match_value(tabletypes, type)) == NULL)
370		tname = "unknown";
371
372	l = snprintf(tbuf, size, "%s", tname);
373	tbuf += l;
374	size -= l;
375
376	switch(type) {
377	case IPFW_TABLE_FLOW:
378		if (tflags != 0) {
379			*tbuf++ = ':';
380			l--;
381			print_flags_buffer(tbuf, size, flowtypecmds, tflags);
382		}
383		break;
384	}
385}
386
387/*
388 * Creates new table
389 *
390 * ipfw table NAME create [ type { addr | iface | number | flow } ]
391 *     [ algo algoname ]
392 */
393static void
394table_create(ipfw_obj_header *oh, int ac, char *av[])
395{
396	ipfw_xtable_info xi;
397	int error, tcmd, val;
398	uint32_t fset, fclear;
399	char *e, *p;
400	char tbuf[128];
401
402	memset(&xi, 0, sizeof(xi));
403
404	while (ac > 0) {
405		tcmd = get_token(tablenewcmds, *av, "option");
406		ac--; av++;
407
408		switch (tcmd) {
409		case TOK_LIMIT:
410			NEED1("limit value required");
411			xi.limit = strtol(*av, NULL, 10);
412			ac--; av++;
413			break;
414		case TOK_TYPE:
415			NEED1("table type required");
416			/* Type may have suboptions after ':' */
417			if ((p = strchr(*av, ':')) != NULL)
418				*p++ = '\0';
419			val = match_token(tabletypes, *av);
420			if (val == -1) {
421				concat_tokens(tbuf, sizeof(tbuf), tabletypes,
422				    ", ");
423				errx(EX_USAGE,
424				    "Unknown tabletype: %s. Supported: %s",
425				    *av, tbuf);
426			}
427			xi.type = val;
428			if (p != NULL) {
429				error = table_parse_type(val, p, &xi.tflags);
430				if (error != 0)
431					errx(EX_USAGE,
432					    "Unsupported suboptions: %s", p);
433			}
434			ac--; av++;
435			break;
436		case TOK_VALTYPE:
437			NEED1("table value type required");
438			fset = fclear = 0;
439			val = fill_flags(tablevaltypes, *av, &e, &fset, &fclear);
440			if (val != -1) {
441				xi.vmask = fset;
442				ac--; av++;
443				break;
444			}
445			concat_tokens(tbuf, sizeof(tbuf), tablevaltypes, ", ");
446			errx(EX_USAGE, "Unknown value type: %s. Supported: %s",
447			    e, tbuf);
448			break;
449		case TOK_ALGO:
450			NEED1("table algorithm name required");
451			if (strlen(*av) > sizeof(xi.algoname))
452				errx(EX_USAGE, "algorithm name too long");
453			strlcpy(xi.algoname, *av, sizeof(xi.algoname));
454			ac--; av++;
455			break;
456		case TOK_LOCK:
457			xi.flags |= IPFW_TGFLAGS_LOCKED;
458			break;
459		}
460	}
461
462	/* Set some defaults to preserve compatibility. */
463	if (xi.algoname[0] == '\0' && xi.type == 0)
464		xi.type = IPFW_TABLE_ADDR;
465	if (xi.vmask == 0)
466		xi.vmask = IPFW_VTYPE_LEGACY;
467
468	if ((error = table_do_create(oh, &xi)) != 0)
469		err(EX_OSERR, "Table creation failed");
470}
471
472/*
473 * Creates new table
474 *
475 * Request: [ ipfw_obj_header ipfw_xtable_info ]
476 *
477 * Returns 0 on success.
478 */
479static int
480table_do_create(ipfw_obj_header *oh, ipfw_xtable_info *i)
481{
482	char tbuf[sizeof(ipfw_obj_header) + sizeof(ipfw_xtable_info)];
483	int error;
484
485	memcpy(tbuf, oh, sizeof(*oh));
486	memcpy(tbuf + sizeof(*oh), i, sizeof(*i));
487	oh = (ipfw_obj_header *)tbuf;
488
489	error = do_set3(IP_FW_TABLE_XCREATE, &oh->opheader, sizeof(tbuf));
490
491	return (error);
492}
493
494/*
495 * Modifies existing table
496 *
497 * ipfw table NAME modify [ limit number ]
498 */
499static void
500table_modify(ipfw_obj_header *oh, int ac, char *av[])
501{
502	ipfw_xtable_info xi;
503	int tcmd;
504
505	memset(&xi, 0, sizeof(xi));
506
507	while (ac > 0) {
508		tcmd = get_token(tablenewcmds, *av, "option");
509		ac--; av++;
510
511		switch (tcmd) {
512		case TOK_LIMIT:
513			NEED1("limit value required");
514			xi.limit = strtol(*av, NULL, 10);
515			xi.mflags |= IPFW_TMFLAGS_LIMIT;
516			ac--; av++;
517			break;
518		default:
519			errx(EX_USAGE, "cmd is not supported for modificatiob");
520		}
521	}
522
523	if (table_do_modify(oh, &xi) != 0)
524		err(EX_OSERR, "Table modification failed");
525}
526
527/*
528 * Modifies existing table.
529 *
530 * Request: [ ipfw_obj_header ipfw_xtable_info ]
531 *
532 * Returns 0 on success.
533 */
534static int
535table_do_modify(ipfw_obj_header *oh, ipfw_xtable_info *i)
536{
537	char tbuf[sizeof(ipfw_obj_header) + sizeof(ipfw_xtable_info)];
538	int error;
539
540	memcpy(tbuf, oh, sizeof(*oh));
541	memcpy(tbuf + sizeof(*oh), i, sizeof(*i));
542	oh = (ipfw_obj_header *)tbuf;
543
544	error = do_set3(IP_FW_TABLE_XMODIFY, &oh->opheader, sizeof(tbuf));
545
546	return (error);
547}
548
549/*
550 * Locks or unlocks given table
551 */
552static void
553table_lock(ipfw_obj_header *oh, int lock)
554{
555	ipfw_xtable_info xi;
556
557	memset(&xi, 0, sizeof(xi));
558
559	xi.mflags |= IPFW_TMFLAGS_LOCK;
560	xi.flags |= (lock != 0) ? IPFW_TGFLAGS_LOCKED : 0;
561
562	if (table_do_modify(oh, &xi) != 0)
563		err(EX_OSERR, "Table %s failed", lock != 0 ? "lock" : "unlock");
564}
565
566/*
567 * Destroys given table specified by @oh->ntlv.
568 * Returns 0 on success.
569 */
570static int
571table_destroy(ipfw_obj_header *oh)
572{
573
574	if (do_set3(IP_FW_TABLE_XDESTROY, &oh->opheader, sizeof(*oh)) != 0)
575		return (-1);
576
577	return (0);
578}
579
580static int
581table_destroy_one(ipfw_xtable_info *i, void *arg)
582{
583	ipfw_obj_header *oh;
584
585	oh = (ipfw_obj_header *)arg;
586	table_fill_ntlv(&oh->ntlv, i->tablename, i->set, 1);
587	if (table_destroy(oh) != 0) {
588		if (co.do_quiet == 0)
589			warn("failed to destroy table(%s) in set %u",
590			    i->tablename, i->set);
591		return (-1);
592	}
593	return (0);
594}
595
596/*
597 * Flushes given table specified by @oh->ntlv.
598 * Returns 0 on success.
599 */
600static int
601table_flush(ipfw_obj_header *oh)
602{
603
604	if (do_set3(IP_FW_TABLE_XFLUSH, &oh->opheader, sizeof(*oh)) != 0)
605		return (-1);
606
607	return (0);
608}
609
610static int
611table_do_swap(ipfw_obj_header *oh, char *second)
612{
613	char tbuf[sizeof(ipfw_obj_header) + sizeof(ipfw_obj_ntlv)];
614	int error;
615
616	memset(tbuf, 0, sizeof(tbuf));
617	memcpy(tbuf, oh, sizeof(*oh));
618	oh = (ipfw_obj_header *)tbuf;
619	table_fill_ntlv((ipfw_obj_ntlv *)(oh + 1), second, oh->ntlv.set, 1);
620
621	error = do_set3(IP_FW_TABLE_XSWAP, &oh->opheader, sizeof(tbuf));
622
623	return (error);
624}
625
626/*
627 * Swaps given table with @second one.
628 */
629static int
630table_swap(ipfw_obj_header *oh, char *second)
631{
632
633	if (table_check_name(second) != 0)
634		errx(EX_USAGE, "table name %s is invalid", second);
635
636	if (table_do_swap(oh, second) == 0)
637		return (0);
638
639	switch (errno) {
640	case EINVAL:
641		errx(EX_USAGE, "Unable to swap table: check types");
642	case EFBIG:
643		errx(EX_USAGE, "Unable to swap table: check limits");
644	}
645
646	return (0);
647}
648
649
650/*
651 * Retrieves table in given table specified by @oh->ntlv.
652 * it inside @i.
653 * Returns 0 on success.
654 */
655static int
656table_get_info(ipfw_obj_header *oh, ipfw_xtable_info *i)
657{
658	char tbuf[sizeof(ipfw_obj_header) + sizeof(ipfw_xtable_info)];
659	size_t sz;
660
661	sz = sizeof(tbuf);
662	memset(tbuf, 0, sizeof(tbuf));
663	memcpy(tbuf, oh, sizeof(*oh));
664	oh = (ipfw_obj_header *)tbuf;
665
666	if (do_get3(IP_FW_TABLE_XINFO, &oh->opheader, &sz) != 0)
667		return (errno);
668
669	if (sz < sizeof(tbuf))
670		return (EINVAL);
671
672	*i = *(ipfw_xtable_info *)(oh + 1);
673
674	return (0);
675}
676
677static struct _s_x tablealgoclass[] = {
678      { "hash",		IPFW_TACLASS_HASH },
679      { "array",	IPFW_TACLASS_ARRAY },
680      { "radix",	IPFW_TACLASS_RADIX },
681      { NULL, 0 }
682};
683
684struct ta_cldata {
685	uint8_t		taclass;
686	uint8_t		spare4;
687	uint16_t	itemsize;
688	uint16_t	itemsize6;
689	uint32_t	size;
690	uint32_t	count;
691};
692
693/*
694 * Print global/per-AF table @i algorithm info.
695 */
696static void
697table_show_tainfo(ipfw_xtable_info *i, struct ta_cldata *d,
698    const char *af, const char *taclass)
699{
700
701	switch (d->taclass) {
702	case IPFW_TACLASS_HASH:
703	case IPFW_TACLASS_ARRAY:
704		printf(" %salgorithm %s info\n", af, taclass);
705		if (d->itemsize == d->itemsize6)
706			printf("  size: %u items: %u itemsize: %u\n",
707			    d->size, d->count, d->itemsize);
708		else
709			printf("  size: %u items: %u "
710			    "itemsize4: %u itemsize6: %u\n",
711			    d->size, d->count,
712			    d->itemsize, d->itemsize6);
713		break;
714	case IPFW_TACLASS_RADIX:
715		printf(" %salgorithm %s info\n", af, taclass);
716		if (d->itemsize == d->itemsize6)
717			printf("  items: %u itemsize: %u\n",
718			    d->count, d->itemsize);
719		else
720			printf("  items: %u "
721			    "itemsize4: %u itemsize6: %u\n",
722			    d->count, d->itemsize, d->itemsize6);
723		break;
724	default:
725		printf(" algo class: %s\n", taclass);
726	}
727}
728
729static void
730table_print_valheader(char *buf, size_t bufsize, uint32_t vmask)
731{
732
733	if (vmask == IPFW_VTYPE_LEGACY) {
734		snprintf(buf, bufsize, "legacy");
735		return;
736	}
737
738	memset(buf, 0, bufsize);
739	print_flags_buffer(buf, bufsize, tablevaltypes, vmask);
740}
741
742/*
743 * Prints table info struct @i in human-readable form.
744 */
745static int
746table_show_info(ipfw_xtable_info *i, void *arg)
747{
748	const char *vtype;
749	ipfw_ta_tinfo *tainfo;
750	int afdata, afitem;
751	struct ta_cldata d;
752	char ttype[64], tvtype[64];
753
754	table_print_type(ttype, sizeof(ttype), i->type, i->tflags);
755	table_print_valheader(tvtype, sizeof(tvtype), i->vmask);
756
757	printf("--- table(%s), set(%u) ---\n", i->tablename, i->set);
758	if ((i->flags & IPFW_TGFLAGS_LOCKED) != 0)
759		printf(" kindex: %d, type: %s, locked\n", i->kidx, ttype);
760	else
761		printf(" kindex: %d, type: %s\n", i->kidx, ttype);
762	printf(" references: %u, valtype: %s\n", i->refcnt, tvtype);
763	printf(" algorithm: %s\n", i->algoname);
764	printf(" items: %u, size: %u\n", i->count, i->size);
765	if (i->limit > 0)
766		printf(" limit: %u\n", i->limit);
767
768	/* Print algo-specific info if requested & set  */
769	if (arg == NULL)
770		return (0);
771
772	if ((i->ta_info.flags & IPFW_TATFLAGS_DATA) == 0)
773		return (0);
774	tainfo = &i->ta_info;
775
776	afdata = 0;
777	afitem = 0;
778	if (tainfo->flags & IPFW_TATFLAGS_AFDATA)
779		afdata = 1;
780	if (tainfo->flags & IPFW_TATFLAGS_AFITEM)
781		afitem = 1;
782
783	memset(&d, 0, sizeof(d));
784	d.taclass = tainfo->taclass4;
785	d.size = tainfo->size4;
786	d.count = tainfo->count4;
787	d.itemsize = tainfo->itemsize4;
788	if (afdata == 0 && afitem != 0)
789		d.itemsize6 = tainfo->itemsize6;
790	else
791		d.itemsize6 = d.itemsize;
792	if ((vtype = match_value(tablealgoclass, d.taclass)) == NULL)
793		vtype = "unknown";
794
795	if (afdata == 0) {
796		table_show_tainfo(i, &d, "", vtype);
797	} else {
798		table_show_tainfo(i, &d, "IPv4 ", vtype);
799		memset(&d, 0, sizeof(d));
800		d.taclass = tainfo->taclass6;
801		if ((vtype = match_value(tablealgoclass, d.taclass)) == NULL)
802			vtype = "unknown";
803		d.size = tainfo->size6;
804		d.count = tainfo->count6;
805		d.itemsize = tainfo->itemsize6;
806		d.itemsize6 = d.itemsize;
807		table_show_tainfo(i, &d, "IPv6 ", vtype);
808	}
809
810	return (0);
811}
812
813
814/*
815 * Function wrappers which can be used either
816 * as is or as foreach function parameter.
817 */
818
819static int
820table_show_one(ipfw_xtable_info *i, void *arg)
821{
822	ipfw_obj_header *oh;
823	int error;
824
825	if ((error = table_do_get_list(i, &oh)) != 0) {
826		err(EX_OSERR, "Error requesting table %s list", i->tablename);
827		return (error);
828	}
829
830	table_show_list(oh, 1);
831
832	free(oh);
833	return (0);
834}
835
836static int
837table_flush_one(ipfw_xtable_info *i, void *arg)
838{
839	ipfw_obj_header *oh;
840
841	oh = (ipfw_obj_header *)arg;
842
843	table_fill_ntlv(&oh->ntlv, i->tablename, i->set, 1);
844
845	return (table_flush(oh));
846}
847
848static int
849table_do_modify_record(int cmd, ipfw_obj_header *oh,
850    ipfw_obj_tentry *tent, int count, int atomic)
851{
852	ipfw_obj_ctlv *ctlv;
853	ipfw_obj_tentry *tent_base;
854	caddr_t pbuf;
855	char xbuf[sizeof(*oh) + sizeof(ipfw_obj_ctlv) + sizeof(*tent)];
856	int error, i;
857	size_t sz;
858
859	sz = sizeof(*ctlv) + sizeof(*tent) * count;
860	if (count == 1) {
861		memset(xbuf, 0, sizeof(xbuf));
862		pbuf = xbuf;
863	} else {
864		if ((pbuf = calloc(1, sizeof(*oh) + sz)) == NULL)
865			return (ENOMEM);
866	}
867
868	memcpy(pbuf, oh, sizeof(*oh));
869	oh = (ipfw_obj_header *)pbuf;
870	oh->opheader.version = 1;
871
872	ctlv = (ipfw_obj_ctlv *)(oh + 1);
873	ctlv->count = count;
874	ctlv->head.length = sz;
875	if (atomic != 0)
876		ctlv->flags |= IPFW_CTF_ATOMIC;
877
878	tent_base = tent;
879	memcpy(ctlv + 1, tent, sizeof(*tent) * count);
880	tent = (ipfw_obj_tentry *)(ctlv + 1);
881	for (i = 0; i < count; i++, tent++) {
882		tent->head.length = sizeof(ipfw_obj_tentry);
883		tent->idx = oh->idx;
884	}
885
886	sz += sizeof(*oh);
887	error = do_get3(cmd, &oh->opheader, &sz);
888	if (error != 0)
889		error = errno;
890	tent = (ipfw_obj_tentry *)(ctlv + 1);
891	/* Copy result back to provided buffer */
892	memcpy(tent_base, ctlv + 1, sizeof(*tent) * count);
893
894	if (pbuf != xbuf)
895		free(pbuf);
896
897	return (error);
898}
899
900static void
901table_modify_record(ipfw_obj_header *oh, int ac, char *av[], int add,
902    int quiet, int update, int atomic)
903{
904	ipfw_obj_tentry *ptent, tent, *tent_buf;
905	ipfw_xtable_info xi;
906	uint8_t type;
907	uint32_t vmask;
908	int cmd, count, error, i, ignored;
909	char *texterr, *etxt, *px;
910
911	if (ac == 0)
912		errx(EX_USAGE, "address required");
913
914	if (add != 0) {
915		cmd = IP_FW_TABLE_XADD;
916		texterr = "Adding record failed";
917	} else {
918		cmd = IP_FW_TABLE_XDEL;
919		texterr = "Deleting record failed";
920	}
921
922	/*
923	 * Calculate number of entries:
924	 * Assume [key val] x N for add
925	 * and
926	 * key x N for delete
927	 */
928	count = (add != 0) ? ac / 2 + 1 : ac;
929
930	if (count <= 1) {
931		/* Adding single entry with/without value */
932		memset(&tent, 0, sizeof(tent));
933		tent_buf = &tent;
934	} else {
935
936		if ((tent_buf = calloc(count, sizeof(tent))) == NULL)
937			errx(EX_OSERR,
938			    "Unable to allocate memory for all entries");
939	}
940	ptent = tent_buf;
941
942	memset(&xi, 0, sizeof(xi));
943	count = 0;
944	while (ac > 0) {
945		tentry_fill_key(oh, ptent, *av, add, &type, &vmask, &xi);
946
947		/*
948		 * Compatibility layer: auto-create table if not exists.
949		 */
950		if (xi.tablename[0] == '\0') {
951			xi.type = type;
952			xi.vmask = vmask;
953			strlcpy(xi.tablename, oh->ntlv.name,
954			    sizeof(xi.tablename));
955			if (quiet == 0)
956				warnx("DEPRECATED: inserting data into "
957				    "non-existent table %s. (auto-created)",
958				    xi.tablename);
959			table_do_create(oh, &xi);
960		}
961
962		oh->ntlv.type = type;
963		ac--; av++;
964
965		if (add != 0 && ac > 0) {
966			tentry_fill_value(oh, ptent, *av, type, vmask);
967			ac--; av++;
968		}
969
970		if (update != 0)
971			ptent->head.flags |= IPFW_TF_UPDATE;
972
973		count++;
974		ptent++;
975	}
976
977	error = table_do_modify_record(cmd, oh, tent_buf, count, atomic);
978
979	/*
980	 * Compatibility stuff: do not yell on duplicate keys or
981	 * failed deletions.
982	 */
983	if (error == 0 || (error == EEXIST && add != 0) ||
984	    (error == ENOENT && add == 0)) {
985		if (quiet != 0) {
986			if (tent_buf != &tent)
987				free(tent_buf);
988			return;
989		}
990	}
991
992	/* Report results back */
993	ptent = tent_buf;
994	for (i = 0; i < count; ptent++, i++) {
995		ignored = 0;
996		switch (ptent->result) {
997		case IPFW_TR_ADDED:
998			px = "added";
999			break;
1000		case IPFW_TR_DELETED:
1001			px = "deleted";
1002			break;
1003		case IPFW_TR_UPDATED:
1004			px = "updated";
1005			break;
1006		case IPFW_TR_LIMIT:
1007			px = "limit";
1008			ignored = 1;
1009			break;
1010		case IPFW_TR_ERROR:
1011			px = "error";
1012			ignored = 1;
1013			break;
1014		case IPFW_TR_NOTFOUND:
1015			px = "notfound";
1016			ignored = 1;
1017			break;
1018		case IPFW_TR_EXISTS:
1019			px = "exists";
1020			ignored = 1;
1021			break;
1022		case IPFW_TR_IGNORED:
1023			px = "ignored";
1024			ignored = 1;
1025			break;
1026		default:
1027			px = "unknown";
1028			ignored = 1;
1029		}
1030
1031		if (error != 0 && atomic != 0 && ignored == 0)
1032			printf("%s(reverted): ", px);
1033		else
1034			printf("%s: ", px);
1035
1036		table_show_entry(&xi, ptent);
1037	}
1038
1039	if (tent_buf != &tent)
1040		free(tent_buf);
1041
1042	if (error == 0)
1043		return;
1044	/* Get real OS error */
1045	error = errno;
1046
1047	/* Try to provide more human-readable error */
1048	switch (error) {
1049	case EEXIST:
1050		etxt = "record already exists";
1051		break;
1052	case EFBIG:
1053		etxt = "limit hit";
1054		break;
1055	case ESRCH:
1056		etxt = "table not found";
1057		break;
1058	case ENOENT:
1059		etxt = "record not found";
1060		break;
1061	case EACCES:
1062		etxt = "table is locked";
1063		break;
1064	default:
1065		etxt = strerror(error);
1066	}
1067
1068	errx(EX_OSERR, "%s: %s", texterr, etxt);
1069}
1070
1071static int
1072table_do_lookup(ipfw_obj_header *oh, char *key, ipfw_xtable_info *xi,
1073    ipfw_obj_tentry *xtent)
1074{
1075	char xbuf[sizeof(ipfw_obj_header) + sizeof(ipfw_obj_tentry)];
1076	ipfw_obj_tentry *tent;
1077	uint8_t type;
1078	uint32_t vmask;
1079	size_t sz;
1080
1081	memcpy(xbuf, oh, sizeof(*oh));
1082	oh = (ipfw_obj_header *)xbuf;
1083	tent = (ipfw_obj_tentry *)(oh + 1);
1084
1085	memset(tent, 0, sizeof(*tent));
1086	tent->head.length = sizeof(*tent);
1087	tent->idx = 1;
1088
1089	tentry_fill_key(oh, tent, key, 0, &type, &vmask, xi);
1090	oh->ntlv.type = type;
1091
1092	sz = sizeof(xbuf);
1093	if (do_get3(IP_FW_TABLE_XFIND, &oh->opheader, &sz) != 0)
1094		return (errno);
1095
1096	if (sz < sizeof(xbuf))
1097		return (EINVAL);
1098
1099	*xtent = *tent;
1100
1101	return (0);
1102}
1103
1104static void
1105table_lookup(ipfw_obj_header *oh, int ac, char *av[])
1106{
1107	ipfw_obj_tentry xtent;
1108	ipfw_xtable_info xi;
1109	char key[64];
1110	int error;
1111
1112	if (ac == 0)
1113		errx(EX_USAGE, "address required");
1114
1115	strlcpy(key, *av, sizeof(key));
1116
1117	memset(&xi, 0, sizeof(xi));
1118	error = table_do_lookup(oh, key, &xi, &xtent);
1119
1120	switch (error) {
1121	case 0:
1122		break;
1123	case ESRCH:
1124		errx(EX_UNAVAILABLE, "Table %s not found", oh->ntlv.name);
1125	case ENOENT:
1126		errx(EX_UNAVAILABLE, "Entry %s not found", *av);
1127	case ENOTSUP:
1128		errx(EX_UNAVAILABLE, "Table %s algo does not support "
1129		    "\"lookup\" method", oh->ntlv.name);
1130	default:
1131		err(EX_OSERR, "getsockopt(IP_FW_TABLE_XFIND)");
1132	}
1133
1134	table_show_entry(&xi, &xtent);
1135}
1136
1137static void
1138tentry_fill_key_type(char *arg, ipfw_obj_tentry *tentry, uint8_t type,
1139    uint8_t tflags)
1140{
1141	char *p, *pp;
1142	int mask, af;
1143	struct in6_addr *paddr, tmp;
1144	struct tflow_entry *tfe;
1145	uint32_t key, *pkey;
1146	uint16_t port;
1147	struct protoent *pent;
1148	struct servent *sent;
1149	int masklen;
1150
1151	masklen = 0;
1152	af = 0;
1153	paddr = (struct in6_addr *)&tentry->k;
1154
1155	switch (type) {
1156	case IPFW_TABLE_ADDR:
1157		/* Remove / if exists */
1158		if ((p = strchr(arg, '/')) != NULL) {
1159			*p = '\0';
1160			mask = atoi(p + 1);
1161		}
1162
1163		if (inet_pton(AF_INET, arg, paddr) == 1) {
1164			if (p != NULL && mask > 32)
1165				errx(EX_DATAERR, "bad IPv4 mask width: %s",
1166				    p + 1);
1167
1168			masklen = p ? mask : 32;
1169			af = AF_INET;
1170		} else if (inet_pton(AF_INET6, arg, paddr) == 1) {
1171			if (IN6_IS_ADDR_V4COMPAT(paddr))
1172				errx(EX_DATAERR,
1173				    "Use IPv4 instead of v4-compatible");
1174			if (p != NULL && mask > 128)
1175				errx(EX_DATAERR, "bad IPv6 mask width: %s",
1176				    p + 1);
1177
1178			masklen = p ? mask : 128;
1179			af = AF_INET6;
1180		} else {
1181			/* Assume FQDN */
1182			if (lookup_host(arg, (struct in_addr *)paddr) != 0)
1183				errx(EX_NOHOST, "hostname ``%s'' unknown", arg);
1184
1185			masklen = 32;
1186			type = IPFW_TABLE_ADDR;
1187			af = AF_INET;
1188		}
1189		break;
1190	case IPFW_TABLE_INTERFACE:
1191		/* Assume interface name. Copy significant data only */
1192		mask = MIN(strlen(arg), IF_NAMESIZE - 1);
1193		memcpy(paddr, arg, mask);
1194		/* Set mask to exact match */
1195		masklen = 8 * IF_NAMESIZE;
1196		break;
1197	case IPFW_TABLE_NUMBER:
1198		/* Port or any other key */
1199		key = strtol(arg, &p, 10);
1200		if (*p != '\0')
1201			errx(EX_DATAERR, "Invalid number: %s", arg);
1202
1203		pkey = (uint32_t *)paddr;
1204		*pkey = key;
1205		masklen = 32;
1206		break;
1207	case IPFW_TABLE_FLOW:
1208		/* Assume [src-ip][,proto][,src-port][,dst-ip][,dst-port] */
1209		tfe = &tentry->k.flow;
1210		af = 0;
1211
1212		/* Handle <ipv4|ipv6> */
1213		if ((tflags & IPFW_TFFLAG_SRCIP) != 0) {
1214			if ((p = strchr(arg, ',')) != NULL)
1215				*p++ = '\0';
1216			/* Determine family using temporary storage */
1217			if (inet_pton(AF_INET, arg, &tmp) == 1) {
1218				if (af != 0 && af != AF_INET)
1219					errx(EX_DATAERR,
1220					    "Inconsistent address family\n");
1221				af = AF_INET;
1222				memcpy(&tfe->a.a4.sip, &tmp, 4);
1223			} else if (inet_pton(AF_INET6, arg, &tmp) == 1) {
1224				if (af != 0 && af != AF_INET6)
1225					errx(EX_DATAERR,
1226					    "Inconsistent address family\n");
1227				af = AF_INET6;
1228				memcpy(&tfe->a.a6.sip6, &tmp, 16);
1229			}
1230
1231			arg = p;
1232		}
1233
1234		/* Handle <proto-num|proto-name> */
1235		if ((tflags & IPFW_TFFLAG_PROTO) != 0) {
1236			if (arg == NULL)
1237				errx(EX_DATAERR, "invalid key: proto missing");
1238			if ((p = strchr(arg, ',')) != NULL)
1239				*p++ = '\0';
1240
1241			key = strtol(arg, &pp, 10);
1242			if (*pp != '\0') {
1243				if ((pent = getprotobyname(arg)) == NULL)
1244					errx(EX_DATAERR, "Unknown proto: %s",
1245					    arg);
1246				else
1247					key = pent->p_proto;
1248			}
1249
1250			if (key > 255)
1251				errx(EX_DATAERR, "Bad protocol number: %u",key);
1252
1253			tfe->proto = key;
1254
1255			arg = p;
1256		}
1257
1258		/* Handle <port-num|service-name> */
1259		if ((tflags & IPFW_TFFLAG_SRCPORT) != 0) {
1260			if (arg == NULL)
1261				errx(EX_DATAERR, "invalid key: src port missing");
1262			if ((p = strchr(arg, ',')) != NULL)
1263				*p++ = '\0';
1264
1265			port = htons(strtol(arg, &pp, 10));
1266			if (*pp != '\0') {
1267				if ((sent = getservbyname(arg, NULL)) == NULL)
1268					errx(EX_DATAERR, "Unknown service: %s",
1269					    arg);
1270				port = sent->s_port;
1271			}
1272			tfe->sport = port;
1273			arg = p;
1274		}
1275
1276		/* Handle <ipv4|ipv6>*/
1277		if ((tflags & IPFW_TFFLAG_DSTIP) != 0) {
1278			if (arg == NULL)
1279				errx(EX_DATAERR, "invalid key: dst ip missing");
1280			if ((p = strchr(arg, ',')) != NULL)
1281				*p++ = '\0';
1282			/* Determine family using temporary storage */
1283			if (inet_pton(AF_INET, arg, &tmp) == 1) {
1284				if (af != 0 && af != AF_INET)
1285					errx(EX_DATAERR,
1286					    "Inconsistent address family");
1287				af = AF_INET;
1288				memcpy(&tfe->a.a4.dip, &tmp, 4);
1289			} else if (inet_pton(AF_INET6, arg, &tmp) == 1) {
1290				if (af != 0 && af != AF_INET6)
1291					errx(EX_DATAERR,
1292					    "Inconsistent address family");
1293				af = AF_INET6;
1294				memcpy(&tfe->a.a6.dip6, &tmp, 16);
1295			}
1296
1297			arg = p;
1298		}
1299
1300		/* Handle <port-num|service-name> */
1301		if ((tflags & IPFW_TFFLAG_DSTPORT) != 0) {
1302			if (arg == NULL)
1303				errx(EX_DATAERR, "invalid key: dst port missing");
1304			if ((p = strchr(arg, ',')) != NULL)
1305				*p++ = '\0';
1306
1307			port = htons(strtol(arg, &pp, 10));
1308			if (*pp != '\0') {
1309				if ((sent = getservbyname(arg, NULL)) == NULL)
1310					errx(EX_DATAERR, "Unknown service: %s",
1311					    arg);
1312				port = sent->s_port;
1313			}
1314			tfe->dport = port;
1315			arg = p;
1316		}
1317
1318		tfe->af = af;
1319
1320		break;
1321
1322	default:
1323		errx(EX_DATAERR, "Unsupported table type: %d", type);
1324	}
1325
1326	tentry->subtype = af;
1327	tentry->masklen = masklen;
1328}
1329
1330/*
1331 * Tries to guess table key type.
1332 * This procedure is used in legacy table auto-create
1333 * code AND in `ipfw -n` ruleset checking.
1334 *
1335 * Imported from old table_fill_xentry() parse code.
1336 */
1337static int
1338guess_key_type(char *key, uint8_t *ptype)
1339{
1340	char *p;
1341	struct in6_addr addr;
1342	uint32_t kv;
1343
1344	if (ishexnumber(*key) != 0 || *key == ':') {
1345		/* Remove / if exists */
1346		if ((p = strchr(key, '/')) != NULL)
1347			*p = '\0';
1348
1349		if ((inet_pton(AF_INET, key, &addr) == 1) ||
1350		    (inet_pton(AF_INET6, key, &addr) == 1)) {
1351			*ptype = IPFW_TABLE_CIDR;
1352			if (p != NULL)
1353				*p = '/';
1354			return (0);
1355		} else {
1356			/* Port or any other key */
1357			/* Skip non-base 10 entries like 'fa1' */
1358			kv = strtol(key, &p, 10);
1359			if (*p == '\0') {
1360				*ptype = IPFW_TABLE_NUMBER;
1361				return (0);
1362			} else if ((p != key) && (*p == '.')) {
1363				/*
1364				 * Warn on IPv4 address strings
1365				 * which are "valid" for inet_aton() but not
1366				 * in inet_pton().
1367				 *
1368				 * Typical examples: '10.5' or '10.0.0.05'
1369				 */
1370				return (1);
1371			}
1372		}
1373	}
1374
1375	if (strchr(key, '.') == NULL) {
1376		*ptype = IPFW_TABLE_INTERFACE;
1377		return (0);
1378	}
1379
1380	if (lookup_host(key, (struct in_addr *)&addr) != 0)
1381		return (1);
1382
1383	*ptype = IPFW_TABLE_CIDR;
1384	return (0);
1385}
1386
1387static void
1388tentry_fill_key(ipfw_obj_header *oh, ipfw_obj_tentry *tent, char *key,
1389    int add, uint8_t *ptype, uint32_t *pvmask, ipfw_xtable_info *xi)
1390{
1391	uint8_t type, tflags;
1392	uint32_t vmask;
1393	int error;
1394
1395	type = 0;
1396	tflags = 0;
1397	vmask = 0;
1398
1399	if (xi->tablename[0] == '\0')
1400		error = table_get_info(oh, xi);
1401	else
1402		error = 0;
1403
1404	if (error == 0) {
1405		if (co.test_only == 0) {
1406			/* Table found */
1407			type = xi->type;
1408			tflags = xi->tflags;
1409			vmask = xi->vmask;
1410		} else {
1411			/*
1412			 * We're running `ipfw -n`
1413			 * Compatibility layer: try to guess key type
1414			 * before failing.
1415			 */
1416			if (guess_key_type(key, &type) != 0) {
1417				/* Inknown key */
1418				errx(EX_USAGE, "Cannot guess "
1419				    "key '%s' type", key);
1420			}
1421			vmask = IPFW_VTYPE_LEGACY;
1422		}
1423	} else {
1424		if (error != ESRCH)
1425			errx(EX_OSERR, "Error requesting table %s info",
1426			    oh->ntlv.name);
1427		if (add == 0)
1428			errx(EX_DATAERR, "Table %s does not exist",
1429			    oh->ntlv.name);
1430		/*
1431		 * Table does not exist
1432		 * Compatibility layer: try to guess key type before failing.
1433		 */
1434		if (guess_key_type(key, &type) != 0) {
1435			/* Inknown key */
1436			errx(EX_USAGE, "Table %s does not exist, cannot guess "
1437			    "key '%s' type", oh->ntlv.name, key);
1438		}
1439
1440		vmask = IPFW_VTYPE_LEGACY;
1441	}
1442
1443	tentry_fill_key_type(key, tent, type, tflags);
1444
1445	*ptype = type;
1446	*pvmask = vmask;
1447}
1448
1449static void
1450set_legacy_value(uint32_t val, ipfw_table_value *v)
1451{
1452	v->tag = val;
1453	v->pipe = val;
1454	v->divert = val;
1455	v->skipto = val;
1456	v->netgraph = val;
1457	v->fib = val;
1458	v->nat = val;
1459	v->nh4 = val;
1460	v->dscp = (uint8_t)val;
1461	v->limit = val;
1462}
1463
1464static void
1465tentry_fill_value(ipfw_obj_header *oh, ipfw_obj_tentry *tent, char *arg,
1466    uint8_t type, uint32_t vmask)
1467{
1468	struct addrinfo hints, *res;
1469	uint32_t a4, flag, val;
1470	ipfw_table_value *v;
1471	uint32_t i;
1472	int dval;
1473	char *comma, *e, *etype, *n, *p;
1474
1475	v = &tent->v.value;
1476
1477	/* Compat layer: keep old behavior for legacy value types */
1478	if (vmask == IPFW_VTYPE_LEGACY) {
1479		/* Try to interpret as number first */
1480		val = strtoul(arg, &p, 0);
1481		if (*p == '\0') {
1482			set_legacy_value(val, v);
1483			return;
1484		}
1485		if (inet_pton(AF_INET, arg, &val) == 1) {
1486			set_legacy_value(ntohl(val), v);
1487			return;
1488		}
1489		/* Try hostname */
1490		if (lookup_host(arg, (struct in_addr *)&val) == 0) {
1491			set_legacy_value(val, v);
1492			return;
1493		}
1494		errx(EX_OSERR, "Unable to parse value %s", arg);
1495	}
1496
1497	/*
1498	 * Shorthands: handle single value if vmask consists
1499	 * of numbers only. e.g.:
1500	 * vmask = "fib,skipto" -> treat input "1" as "1,1"
1501	 */
1502
1503	n = arg;
1504	etype = NULL;
1505	for (i = 1; i < (1 << 31); i *= 2) {
1506		if ((flag = (vmask & i)) == 0)
1507			continue;
1508		vmask &= ~flag;
1509
1510		if ((comma = strchr(n, ',')) != NULL)
1511			*comma = '\0';
1512
1513		switch (flag) {
1514		case IPFW_VTYPE_TAG:
1515			v->tag = strtol(n, &e, 10);
1516			if (*e != '\0')
1517				etype = "tag";
1518			break;
1519		case IPFW_VTYPE_PIPE:
1520			v->pipe = strtol(n, &e, 10);
1521			if (*e != '\0')
1522				etype = "pipe";
1523			break;
1524		case IPFW_VTYPE_DIVERT:
1525			v->divert = strtol(n, &e, 10);
1526			if (*e != '\0')
1527				etype = "divert";
1528			break;
1529		case IPFW_VTYPE_SKIPTO:
1530			v->skipto = strtol(n, &e, 10);
1531			if (*e != '\0')
1532				etype = "skipto";
1533			break;
1534		case IPFW_VTYPE_NETGRAPH:
1535			v->netgraph = strtol(n, &e, 10);
1536			if (*e != '\0')
1537				etype = "netgraph";
1538			break;
1539		case IPFW_VTYPE_FIB:
1540			v->fib = strtol(n, &e, 10);
1541			if (*e != '\0')
1542				etype = "fib";
1543			break;
1544		case IPFW_VTYPE_NAT:
1545			v->nat = strtol(n, &e, 10);
1546			if (*e != '\0')
1547				etype = "nat";
1548			break;
1549		case IPFW_VTYPE_LIMIT:
1550			v->limit = strtol(n, &e, 10);
1551			if (*e != '\0')
1552				etype = "limit";
1553			break;
1554		case IPFW_VTYPE_NH4:
1555			if (strchr(n, '.') != NULL &&
1556			    inet_pton(AF_INET, n, &a4) == 1) {
1557				v->nh4 = ntohl(a4);
1558				break;
1559			}
1560			if (lookup_host(n, (struct in_addr *)&v->nh4) == 0)
1561				break;
1562			etype = "ipv4";
1563			break;
1564		case IPFW_VTYPE_DSCP:
1565			if (isalpha(*n)) {
1566				if ((dval = match_token(f_ipdscp, n)) != -1) {
1567					v->dscp = dval;
1568					break;
1569				} else
1570					etype = "DSCP code";
1571			} else {
1572				v->dscp = strtol(n, &e, 10);
1573				if (v->dscp > 63 || *e != '\0')
1574					etype = "DSCP value";
1575			}
1576			break;
1577		case IPFW_VTYPE_NH6:
1578			if (strchr(n, ':') != NULL) {
1579				memset(&hints, 0, sizeof(hints));
1580				hints.ai_family = AF_INET6;
1581				hints.ai_flags = AI_NUMERICHOST;
1582				if (getaddrinfo(n, NULL, &hints, &res) == 0) {
1583					v->nh6 = ((struct sockaddr_in6 *)
1584					    res->ai_addr)->sin6_addr;
1585					v->zoneid = ((struct sockaddr_in6 *)
1586					    res->ai_addr)->sin6_scope_id;
1587					freeaddrinfo(res);
1588					break;
1589				}
1590			}
1591			etype = "ipv6";
1592			break;
1593		}
1594
1595		if (etype != NULL)
1596			errx(EX_USAGE, "Unable to parse %s as %s", n, etype);
1597
1598		if (comma != NULL)
1599			*comma++ = ',';
1600
1601		if ((n = comma) != NULL)
1602			continue;
1603
1604		/* End of input. */
1605		if (vmask != 0)
1606			errx(EX_USAGE, "Not enough fields inside value");
1607	}
1608}
1609
1610/*
1611 * Compare table names.
1612 * Honor number comparison.
1613 */
1614static int
1615tablename_cmp(const void *a, const void *b)
1616{
1617	ipfw_xtable_info *ia, *ib;
1618
1619	ia = (ipfw_xtable_info *)a;
1620	ib = (ipfw_xtable_info *)b;
1621
1622	return (stringnum_cmp(ia->tablename, ib->tablename));
1623}
1624
1625/*
1626 * Retrieves table list from kernel,
1627 * optionally sorts it and calls requested function for each table.
1628 * Returns 0 on success.
1629 */
1630static int
1631tables_foreach(table_cb_t *f, void *arg, int sort)
1632{
1633	ipfw_obj_lheader *olh;
1634	ipfw_xtable_info *info;
1635	size_t sz;
1636	int i, error;
1637
1638	/* Start with reasonable default */
1639	sz = sizeof(*olh) + 16 * sizeof(ipfw_xtable_info);
1640
1641	for (;;) {
1642		if ((olh = calloc(1, sz)) == NULL)
1643			return (ENOMEM);
1644
1645		olh->size = sz;
1646		if (do_get3(IP_FW_TABLES_XLIST, &olh->opheader, &sz) != 0) {
1647			sz = olh->size;
1648			free(olh);
1649			if (errno != ENOMEM)
1650				return (errno);
1651			continue;
1652		}
1653
1654		if (sort != 0)
1655			qsort(olh + 1, olh->count, olh->objsize,
1656			    tablename_cmp);
1657
1658		info = (ipfw_xtable_info *)(olh + 1);
1659		for (i = 0; i < olh->count; i++) {
1660			if (co.use_set == 0 || info->set == co.use_set - 1)
1661				error = f(info, arg);
1662			info = (ipfw_xtable_info *)((caddr_t)info +
1663			    olh->objsize);
1664		}
1665		free(olh);
1666		break;
1667	}
1668	return (0);
1669}
1670
1671
1672/*
1673 * Retrieves all entries for given table @i in
1674 * eXtended format. Allocate buffer large enough
1675 * to store result. Called needs to free it later.
1676 *
1677 * Returns 0 on success.
1678 */
1679static int
1680table_do_get_list(ipfw_xtable_info *i, ipfw_obj_header **poh)
1681{
1682	ipfw_obj_header *oh;
1683	size_t sz;
1684	int c;
1685
1686	sz = 0;
1687	oh = NULL;
1688	for (c = 0; c < 8; c++) {
1689		if (sz < i->size)
1690			sz = i->size + 44;
1691		if (oh != NULL)
1692			free(oh);
1693		if ((oh = calloc(1, sz)) == NULL)
1694			continue;
1695		table_fill_objheader(oh, i);
1696		oh->opheader.version = 1; /* Current version */
1697		if (do_get3(IP_FW_TABLE_XLIST, &oh->opheader, &sz) == 0) {
1698			*poh = oh;
1699			return (0);
1700		}
1701
1702		if (errno != ENOMEM)
1703			break;
1704	}
1705	free(oh);
1706
1707	return (errno);
1708}
1709
1710/*
1711 * Shows all entries from @oh in human-readable format
1712 */
1713static void
1714table_show_list(ipfw_obj_header *oh, int need_header)
1715{
1716	ipfw_obj_tentry *tent;
1717	uint32_t count;
1718	ipfw_xtable_info *i;
1719
1720	i = (ipfw_xtable_info *)(oh + 1);
1721	tent = (ipfw_obj_tentry *)(i + 1);
1722
1723	if (need_header)
1724		printf("--- table(%s), set(%u) ---\n", i->tablename, i->set);
1725
1726	count = i->count;
1727	while (count > 0) {
1728		table_show_entry(i, tent);
1729		tent = (ipfw_obj_tentry *)((caddr_t)tent + tent->head.length);
1730		count--;
1731	}
1732}
1733
1734static void
1735table_show_value(char *buf, size_t bufsize, ipfw_table_value *v,
1736    uint32_t vmask, int print_ip)
1737{
1738	char abuf[INET6_ADDRSTRLEN + IF_NAMESIZE + 2];
1739	struct sockaddr_in6 sa6;
1740	uint32_t flag, i, l;
1741	size_t sz;
1742	struct in_addr a4;
1743
1744	sz = bufsize;
1745
1746	/*
1747	 * Some shorthands for printing values:
1748	 * legacy assumes all values are equal, so keep the first one.
1749	 */
1750	if (vmask == IPFW_VTYPE_LEGACY) {
1751		if (print_ip != 0) {
1752			flag = htonl(v->tag);
1753			inet_ntop(AF_INET, &flag, buf, sz);
1754		} else
1755			snprintf(buf, sz, "%u", v->tag);
1756		return;
1757	}
1758
1759	for (i = 1; i < (1 << 31); i *= 2) {
1760		if ((flag = (vmask & i)) == 0)
1761			continue;
1762		l = 0;
1763
1764		switch (flag) {
1765		case IPFW_VTYPE_TAG:
1766			l = snprintf(buf, sz, "%u,", v->tag);
1767			break;
1768		case IPFW_VTYPE_PIPE:
1769			l = snprintf(buf, sz, "%u,", v->pipe);
1770			break;
1771		case IPFW_VTYPE_DIVERT:
1772			l = snprintf(buf, sz, "%d,", v->divert);
1773			break;
1774		case IPFW_VTYPE_SKIPTO:
1775			l = snprintf(buf, sz, "%d,", v->skipto);
1776			break;
1777		case IPFW_VTYPE_NETGRAPH:
1778			l = snprintf(buf, sz, "%u,", v->netgraph);
1779			break;
1780		case IPFW_VTYPE_FIB:
1781			l = snprintf(buf, sz, "%u,", v->fib);
1782			break;
1783		case IPFW_VTYPE_NAT:
1784			l = snprintf(buf, sz, "%u,", v->nat);
1785			break;
1786		case IPFW_VTYPE_LIMIT:
1787			l = snprintf(buf, sz, "%u,", v->limit);
1788			break;
1789		case IPFW_VTYPE_NH4:
1790			a4.s_addr = htonl(v->nh4);
1791			inet_ntop(AF_INET, &a4, abuf, sizeof(abuf));
1792			l = snprintf(buf, sz, "%s,", abuf);
1793			break;
1794		case IPFW_VTYPE_DSCP:
1795			l = snprintf(buf, sz, "%d,", v->dscp);
1796			break;
1797		case IPFW_VTYPE_NH6:
1798			sa6.sin6_family = AF_INET6;
1799			sa6.sin6_len = sizeof(sa6);
1800			sa6.sin6_addr = v->nh6;
1801			sa6.sin6_port = 0;
1802			sa6.sin6_scope_id = v->zoneid;
1803			if (getnameinfo((const struct sockaddr *)&sa6,
1804			    sa6.sin6_len, abuf, sizeof(abuf), NULL, 0,
1805			    NI_NUMERICHOST) == 0)
1806				l = snprintf(buf, sz, "%s,", abuf);
1807			break;
1808		}
1809
1810		buf += l;
1811		sz -= l;
1812	}
1813
1814	if (sz != bufsize)
1815		*(buf - 1) = '\0';
1816}
1817
1818static void
1819table_show_entry(ipfw_xtable_info *i, ipfw_obj_tentry *tent)
1820{
1821	char *comma, tbuf[128], pval[128];
1822	void *paddr;
1823	struct tflow_entry *tfe;
1824
1825	table_show_value(pval, sizeof(pval), &tent->v.value, i->vmask,
1826	    co.do_value_as_ip);
1827
1828	switch (i->type) {
1829	case IPFW_TABLE_ADDR:
1830		/* IPv4 or IPv6 prefixes */
1831		inet_ntop(tent->subtype, &tent->k, tbuf, sizeof(tbuf));
1832		printf("%s/%u %s\n", tbuf, tent->masklen, pval);
1833		break;
1834	case IPFW_TABLE_INTERFACE:
1835		/* Interface names */
1836		printf("%s %s\n", tent->k.iface, pval);
1837		break;
1838	case IPFW_TABLE_NUMBER:
1839		/* numbers */
1840		printf("%u %s\n", tent->k.key, pval);
1841		break;
1842	case IPFW_TABLE_FLOW:
1843		/* flows */
1844		tfe = &tent->k.flow;
1845		comma = "";
1846
1847		if ((i->tflags & IPFW_TFFLAG_SRCIP) != 0) {
1848			if (tfe->af == AF_INET)
1849				paddr = &tfe->a.a4.sip;
1850			else
1851				paddr = &tfe->a.a6.sip6;
1852
1853			inet_ntop(tfe->af, paddr, tbuf, sizeof(tbuf));
1854			printf("%s%s", comma, tbuf);
1855			comma = ",";
1856		}
1857
1858		if ((i->tflags & IPFW_TFFLAG_PROTO) != 0) {
1859			printf("%s%d", comma, tfe->proto);
1860			comma = ",";
1861		}
1862
1863		if ((i->tflags & IPFW_TFFLAG_SRCPORT) != 0) {
1864			printf("%s%d", comma, ntohs(tfe->sport));
1865			comma = ",";
1866		}
1867		if ((i->tflags & IPFW_TFFLAG_DSTIP) != 0) {
1868			if (tfe->af == AF_INET)
1869				paddr = &tfe->a.a4.dip;
1870			else
1871				paddr = &tfe->a.a6.dip6;
1872
1873			inet_ntop(tfe->af, paddr, tbuf, sizeof(tbuf));
1874			printf("%s%s", comma, tbuf);
1875			comma = ",";
1876		}
1877
1878		if ((i->tflags & IPFW_TFFLAG_DSTPORT) != 0) {
1879			printf("%s%d", comma, ntohs(tfe->dport));
1880			comma = ",";
1881		}
1882
1883		printf(" %s\n", pval);
1884	}
1885}
1886
1887static int
1888table_do_get_stdlist(uint16_t opcode, ipfw_obj_lheader **polh)
1889{
1890	ipfw_obj_lheader req, *olh;
1891	size_t sz;
1892
1893	memset(&req, 0, sizeof(req));
1894	sz = sizeof(req);
1895
1896	if (do_get3(opcode, &req.opheader, &sz) != 0)
1897		if (errno != ENOMEM)
1898			return (errno);
1899
1900	sz = req.size;
1901	if ((olh = calloc(1, sz)) == NULL)
1902		return (ENOMEM);
1903
1904	olh->size = sz;
1905	if (do_get3(opcode, &olh->opheader, &sz) != 0) {
1906		free(olh);
1907		return (errno);
1908	}
1909
1910	*polh = olh;
1911	return (0);
1912}
1913
1914static int
1915table_do_get_algolist(ipfw_obj_lheader **polh)
1916{
1917
1918	return (table_do_get_stdlist(IP_FW_TABLES_ALIST, polh));
1919}
1920
1921static int
1922table_do_get_vlist(ipfw_obj_lheader **polh)
1923{
1924
1925	return (table_do_get_stdlist(IP_FW_TABLE_VLIST, polh));
1926}
1927
1928void
1929ipfw_list_ta(int ac, char *av[])
1930{
1931	ipfw_obj_lheader *olh;
1932	ipfw_ta_info *info;
1933	int error, i;
1934	const char *atype;
1935
1936	error = table_do_get_algolist(&olh);
1937	if (error != 0)
1938		err(EX_OSERR, "Unable to request algorithm list");
1939
1940	info = (ipfw_ta_info *)(olh + 1);
1941	for (i = 0; i < olh->count; i++) {
1942		if ((atype = match_value(tabletypes, info->type)) == NULL)
1943			atype = "unknown";
1944		printf("--- %s ---\n", info->algoname);
1945		printf(" type: %s\n refcount: %u\n", atype, info->refcnt);
1946
1947		info = (ipfw_ta_info *)((caddr_t)info + olh->objsize);
1948	}
1949
1950	free(olh);
1951}
1952
1953
1954/* Copy of current kernel table_value structure */
1955struct _table_value {
1956	uint32_t	tag;		/* O_TAG/O_TAGGED */
1957	uint32_t	pipe;		/* O_PIPE/O_QUEUE */
1958	uint16_t	divert;		/* O_DIVERT/O_TEE */
1959	uint16_t	skipto;		/* skipto, CALLRET */
1960	uint32_t	netgraph;	/* O_NETGRAPH/O_NGTEE */
1961	uint32_t	fib;		/* O_SETFIB */
1962	uint32_t	nat;		/* O_NAT */
1963	uint32_t	nh4;
1964	uint8_t		dscp;
1965	uint8_t		spare0;
1966	uint16_t	spare1;
1967	/* -- 32 bytes -- */
1968	struct in6_addr	nh6;
1969	uint32_t	limit;		/* O_LIMIT */
1970	uint32_t	zoneid;
1971	uint64_t	refcnt;		/* Number of references */
1972};
1973
1974int
1975compare_values(const void *_a, const void *_b)
1976{
1977	struct _table_value *a, *b;
1978
1979	a = (struct _table_value *)_a;
1980	b = (struct _table_value *)_b;
1981
1982	if (a->spare1 < b->spare1)
1983		return (-1);
1984	else if (a->spare1 > b->spare1)
1985		return (1);
1986
1987	return (0);
1988}
1989
1990void
1991ipfw_list_values(int ac, char *av[])
1992{
1993	ipfw_obj_lheader *olh;
1994	struct _table_value *v;
1995	int error, i;
1996	uint32_t vmask;
1997	char buf[128];
1998
1999	error = table_do_get_vlist(&olh);
2000	if (error != 0)
2001		err(EX_OSERR, "Unable to request value list");
2002
2003	vmask = 0x7FFFFFFF; /* Similar to IPFW_VTYPE_LEGACY */
2004
2005	table_print_valheader(buf, sizeof(buf), vmask);
2006	printf("HEADER: %s\n", buf);
2007	v = (struct _table_value *)(olh + 1);
2008	qsort(v, olh->count, olh->objsize, compare_values);
2009	for (i = 0; i < olh->count; i++) {
2010		table_show_value(buf, sizeof(buf), (ipfw_table_value *)v,
2011		    vmask, 0);
2012		printf("[%u] refs=%lu %s\n", v->spare1, (u_long)v->refcnt, buf);
2013		v = (struct _table_value *)((caddr_t)v + olh->objsize);
2014	}
2015
2016	free(olh);
2017}
2018
2019int
2020table_check_name(const char *tablename)
2021{
2022
2023	if (ipfw_check_object_name(tablename) != 0)
2024		return (EINVAL);
2025	/* Restrict some 'special' names */
2026	if (strcmp(tablename, "all") == 0)
2027		return (EINVAL);
2028	return (0);
2029}
2030
2031