freebsd_ipfw.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "plugin_freebsd.h"
  3. #include <netinet/ip_fw.h>
  4. #define FREE_MEM_THRESHOLD 10000 // number of unused chunks that trigger memory freeing
  5. #define COMMON_IPFW_ERROR() error("DISABLED: ipfw.packets chart"); \
  6. error("DISABLED: ipfw.bytes chart"); \
  7. error("DISABLED: ipfw.dyn_active chart"); \
  8. error("DISABLED: ipfw.dyn_expired chart"); \
  9. error("DISABLED: ipfw.mem chart");
  10. // --------------------------------------------------------------------------------------------------------------------
  11. // ipfw
  12. int do_ipfw(int update_every, usec_t dt) {
  13. (void)dt;
  14. #if __FreeBSD__ >= 11
  15. static int do_static = -1, do_dynamic = -1, do_mem = -1;
  16. if (unlikely(do_static == -1)) {
  17. do_static = config_get_boolean("plugin:freebsd:ipfw", "counters for static rules", 1);
  18. do_dynamic = config_get_boolean("plugin:freebsd:ipfw", "number of dynamic rules", 1);
  19. do_mem = config_get_boolean("plugin:freebsd:ipfw", "allocated memory", 1);
  20. }
  21. // variables for getting ipfw configuration
  22. int error;
  23. static int ipfw_socket = -1;
  24. static ipfw_cfg_lheader *cfg = NULL;
  25. ip_fw3_opheader *op3 = NULL;
  26. static socklen_t *optlen = NULL, cfg_size = 0;
  27. // variables for static rules handling
  28. ipfw_obj_ctlv *ctlv = NULL;
  29. ipfw_obj_tlv *rbase = NULL;
  30. int rcnt = 0;
  31. int n, seen;
  32. struct ip_fw_rule *rule;
  33. struct ip_fw_bcounter *cntr;
  34. int c = 0;
  35. char rule_num_str[12];
  36. // variables for dynamic rules handling
  37. caddr_t dynbase = NULL;
  38. size_t dynsz = 0;
  39. size_t readsz = sizeof(*cfg);;
  40. int ttype = 0;
  41. ipfw_obj_tlv *tlv;
  42. ipfw_dyn_rule *dyn_rule;
  43. uint16_t rulenum, prev_rulenum = IPFW_DEFAULT_RULE;
  44. unsigned srn, static_rules_num = 0;
  45. static size_t dyn_rules_num_size = 0;
  46. static struct dyn_rule_num {
  47. uint16_t rule_num;
  48. uint32_t active_rules;
  49. uint32_t expired_rules;
  50. } *dyn_rules_num = NULL;
  51. uint32_t *dyn_rules_counter;
  52. if (likely(do_static | do_dynamic | do_mem)) {
  53. // initialize the smallest ipfw_cfg_lheader possible
  54. if (unlikely((optlen == NULL) || (cfg == NULL))) {
  55. optlen = reallocz(optlen, sizeof(socklen_t));
  56. *optlen = cfg_size = 32;
  57. cfg = reallocz(cfg, *optlen);
  58. }
  59. // get socket descriptor and initialize ipfw_cfg_lheader structure
  60. if (unlikely(ipfw_socket == -1))
  61. ipfw_socket = socket(AF_INET, SOCK_RAW, IPPROTO_RAW);
  62. if (unlikely(ipfw_socket == -1)) {
  63. error("FREEBSD: can't get socket for ipfw configuration");
  64. error("FREEBSD: run netdata as root to get access to ipfw data");
  65. COMMON_IPFW_ERROR();
  66. return 1;
  67. }
  68. bzero(cfg, 32);
  69. cfg->flags = IPFW_CFG_GET_STATIC | IPFW_CFG_GET_COUNTERS | IPFW_CFG_GET_STATES;
  70. op3 = &cfg->opheader;
  71. op3->opcode = IP_FW_XGET;
  72. // get ifpw configuration size than get configuration
  73. *optlen = cfg_size;
  74. error = getsockopt(ipfw_socket, IPPROTO_IP, IP_FW3, op3, optlen);
  75. if (error)
  76. if (errno != ENOMEM) {
  77. error("FREEBSD: ipfw socket reading error");
  78. COMMON_IPFW_ERROR();
  79. return 1;
  80. }
  81. if ((cfg->size > cfg_size) || ((cfg_size - cfg->size) > sizeof(struct dyn_rule_num) * FREE_MEM_THRESHOLD)) {
  82. *optlen = cfg_size = cfg->size;
  83. cfg = reallocz(cfg, *optlen);
  84. bzero(cfg, 32);
  85. cfg->flags = IPFW_CFG_GET_STATIC | IPFW_CFG_GET_COUNTERS | IPFW_CFG_GET_STATES;
  86. op3 = &cfg->opheader;
  87. op3->opcode = IP_FW_XGET;
  88. error = getsockopt(ipfw_socket, IPPROTO_IP, IP_FW3, op3, optlen);
  89. if (error) {
  90. error("FREEBSD: ipfw socket reading error");
  91. COMMON_IPFW_ERROR();
  92. return 1;
  93. }
  94. }
  95. // go through static rules configuration structures
  96. ctlv = (ipfw_obj_ctlv *) (cfg + 1);
  97. if (cfg->flags & IPFW_CFG_GET_STATIC) {
  98. /* We've requested static rules */
  99. if (ctlv->head.type == IPFW_TLV_TBLNAME_LIST) {
  100. readsz += ctlv->head.length;
  101. ctlv = (ipfw_obj_ctlv *) ((caddr_t) ctlv +
  102. ctlv->head.length);
  103. }
  104. if (ctlv->head.type == IPFW_TLV_RULE_LIST) {
  105. rbase = (ipfw_obj_tlv *) (ctlv + 1);
  106. rcnt = ctlv->count;
  107. readsz += ctlv->head.length;
  108. ctlv = (ipfw_obj_ctlv *) ((caddr_t) ctlv + ctlv->head.length);
  109. }
  110. }
  111. if ((cfg->flags & IPFW_CFG_GET_STATES) && (readsz != *optlen)) {
  112. /* We may have some dynamic states */
  113. dynsz = *optlen - readsz;
  114. /* Skip empty header */
  115. if (dynsz != sizeof(ipfw_obj_ctlv))
  116. dynbase = (caddr_t) ctlv;
  117. else
  118. dynsz = 0;
  119. }
  120. // --------------------------------------------------------------------
  121. if (likely(do_mem)) {
  122. static RRDSET *st_mem = NULL;
  123. static RRDDIM *rd_dyn_mem = NULL;
  124. static RRDDIM *rd_stat_mem = NULL;
  125. if (unlikely(!st_mem)) {
  126. st_mem = rrdset_create_localhost("ipfw",
  127. "mem",
  128. NULL,
  129. "memory allocated",
  130. NULL,
  131. "Memory allocated by rules",
  132. "bytes",
  133. "freebsd.plugin",
  134. "ipfw",
  135. NETDATA_CHART_PRIO_IPFW_MEM,
  136. update_every,
  137. RRDSET_TYPE_STACKED
  138. );
  139. rrdset_flag_set(st_mem, RRDSET_FLAG_DETAIL);
  140. rd_dyn_mem = rrddim_add(st_mem, "dynamic", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  141. rd_stat_mem = rrddim_add(st_mem, "static", NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  142. } else
  143. rrdset_next(st_mem);
  144. rrddim_set_by_pointer(st_mem, rd_dyn_mem, dynsz);
  145. rrddim_set_by_pointer(st_mem, rd_stat_mem, *optlen - dynsz);
  146. rrdset_done(st_mem);
  147. }
  148. // --------------------------------------------------------------------
  149. static RRDSET *st_packets = NULL, *st_bytes = NULL;
  150. RRDDIM *rd_packets = NULL, *rd_bytes = NULL;
  151. if (likely(do_static || do_dynamic)) {
  152. if (likely(do_static)) {
  153. if (unlikely(!st_packets))
  154. st_packets = rrdset_create_localhost("ipfw",
  155. "packets",
  156. NULL,
  157. "static rules",
  158. NULL,
  159. "Packets",
  160. "packets/s",
  161. "freebsd.plugin",
  162. "ipfw",
  163. NETDATA_CHART_PRIO_IPFW_PACKETS,
  164. update_every,
  165. RRDSET_TYPE_STACKED
  166. );
  167. else
  168. rrdset_next(st_packets);
  169. if (unlikely(!st_bytes))
  170. st_bytes = rrdset_create_localhost("ipfw",
  171. "bytes",
  172. NULL,
  173. "static rules",
  174. NULL,
  175. "Bytes",
  176. "bytes/s",
  177. "freebsd.plugin",
  178. "ipfw",
  179. NETDATA_CHART_PRIO_IPFW_BYTES,
  180. update_every,
  181. RRDSET_TYPE_STACKED
  182. );
  183. else
  184. rrdset_next(st_bytes);
  185. }
  186. for (n = seen = 0; n < rcnt; n++, rbase = (ipfw_obj_tlv *) ((caddr_t) rbase + rbase->length)) {
  187. cntr = (struct ip_fw_bcounter *) (rbase + 1);
  188. rule = (struct ip_fw_rule *) ((caddr_t) cntr + cntr->size);
  189. if (rule->rulenum != prev_rulenum)
  190. static_rules_num++;
  191. if (rule->rulenum > IPFW_DEFAULT_RULE)
  192. break;
  193. if (likely(do_static)) {
  194. sprintf(rule_num_str, "%"PRIu32"_%"PRIu32"", (uint32_t)rule->rulenum, (uint32_t)rule->id);
  195. rd_packets = rrddim_find_active(st_packets, rule_num_str);
  196. if (unlikely(!rd_packets))
  197. rd_packets = rrddim_add(st_packets, rule_num_str, NULL, 1, 1, RRD_ALGORITHM_INCREMENTAL);
  198. rrddim_set_by_pointer(st_packets, rd_packets, cntr->pcnt);
  199. rd_bytes = rrddim_find_active(st_bytes, rule_num_str);
  200. if (unlikely(!rd_bytes))
  201. rd_bytes = rrddim_add(st_bytes, rule_num_str, NULL, 1, 1, RRD_ALGORITHM_INCREMENTAL);
  202. rrddim_set_by_pointer(st_bytes, rd_bytes, cntr->bcnt);
  203. }
  204. c += rbase->length;
  205. seen++;
  206. }
  207. if (likely(do_static)) {
  208. rrdset_done(st_packets);
  209. rrdset_done(st_bytes);
  210. }
  211. }
  212. // --------------------------------------------------------------------
  213. // go through dynamic rules configuration structures
  214. if (likely(do_dynamic && (dynsz > 0))) {
  215. if ((dyn_rules_num_size < sizeof(struct dyn_rule_num) * static_rules_num) ||
  216. ((dyn_rules_num_size - sizeof(struct dyn_rule_num) * static_rules_num) >
  217. sizeof(struct dyn_rule_num) * FREE_MEM_THRESHOLD)) {
  218. dyn_rules_num_size = sizeof(struct dyn_rule_num) * static_rules_num;
  219. dyn_rules_num = reallocz(dyn_rules_num, dyn_rules_num_size);
  220. }
  221. bzero(dyn_rules_num, sizeof(struct dyn_rule_num) * static_rules_num);
  222. dyn_rules_num->rule_num = IPFW_DEFAULT_RULE;
  223. if (dynsz > 0 && ctlv->head.type == IPFW_TLV_DYNSTATE_LIST) {
  224. dynbase += sizeof(*ctlv);
  225. dynsz -= sizeof(*ctlv);
  226. ttype = IPFW_TLV_DYN_ENT;
  227. }
  228. while (dynsz > 0) {
  229. tlv = (ipfw_obj_tlv *) dynbase;
  230. if (tlv->type != ttype)
  231. break;
  232. dyn_rule = (ipfw_dyn_rule *) (tlv + 1);
  233. bcopy(&dyn_rule->rule, &rulenum, sizeof(rulenum));
  234. for (srn = 0; srn < (static_rules_num - 1); srn++) {
  235. if (dyn_rule->expire > 0)
  236. dyn_rules_counter = &dyn_rules_num[srn].active_rules;
  237. else
  238. dyn_rules_counter = &dyn_rules_num[srn].expired_rules;
  239. if (dyn_rules_num[srn].rule_num == rulenum) {
  240. (*dyn_rules_counter)++;
  241. break;
  242. }
  243. if (dyn_rules_num[srn].rule_num == IPFW_DEFAULT_RULE) {
  244. dyn_rules_num[srn].rule_num = rulenum;
  245. dyn_rules_num[srn + 1].rule_num = IPFW_DEFAULT_RULE;
  246. (*dyn_rules_counter)++;
  247. break;
  248. }
  249. }
  250. dynsz -= tlv->length;
  251. dynbase += tlv->length;
  252. }
  253. // --------------------------------------------------------------------
  254. static RRDSET *st_active = NULL, *st_expired = NULL;
  255. RRDDIM *rd_active = NULL, *rd_expired = NULL;
  256. if (unlikely(!st_active))
  257. st_active = rrdset_create_localhost("ipfw",
  258. "active",
  259. NULL,
  260. "dynamic_rules",
  261. NULL,
  262. "Active rules",
  263. "rules",
  264. "freebsd.plugin",
  265. "ipfw",
  266. NETDATA_CHART_PRIO_IPFW_ACTIVE,
  267. update_every,
  268. RRDSET_TYPE_STACKED
  269. );
  270. else
  271. rrdset_next(st_active);
  272. if (unlikely(!st_expired))
  273. st_expired = rrdset_create_localhost("ipfw",
  274. "expired",
  275. NULL,
  276. "dynamic_rules",
  277. NULL,
  278. "Expired rules",
  279. "rules",
  280. "freebsd.plugin",
  281. "ipfw",
  282. NETDATA_CHART_PRIO_IPFW_EXPIRED,
  283. update_every,
  284. RRDSET_TYPE_STACKED
  285. );
  286. else
  287. rrdset_next(st_expired);
  288. for (srn = 0; (srn < (static_rules_num - 1)) && (dyn_rules_num[srn].rule_num != IPFW_DEFAULT_RULE); srn++) {
  289. sprintf(rule_num_str, "%d", dyn_rules_num[srn].rule_num);
  290. rd_active = rrddim_find_active(st_active, rule_num_str);
  291. if (unlikely(!rd_active))
  292. rd_active = rrddim_add(st_active, rule_num_str, NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  293. rrddim_set_by_pointer(st_active, rd_active, dyn_rules_num[srn].active_rules);
  294. rd_expired = rrddim_find_active(st_expired, rule_num_str);
  295. if (unlikely(!rd_expired))
  296. rd_expired = rrddim_add(st_expired, rule_num_str, NULL, 1, 1, RRD_ALGORITHM_ABSOLUTE);
  297. rrddim_set_by_pointer(st_expired, rd_expired, dyn_rules_num[srn].expired_rules);
  298. }
  299. rrdset_done(st_active);
  300. rrdset_done(st_expired);
  301. }
  302. }
  303. return 0;
  304. #else
  305. error("FREEBSD: ipfw charts supported for FreeBSD 11.0 and newer releases only");
  306. COMMON_IPFW_ERROR();
  307. return 1;
  308. #endif
  309. }