ip_log.c revision 172776
1/*	$FreeBSD: head/sys/contrib/ipfilter/netinet/ip_log.c 172776 2007-10-18 21:52:14Z darrenr $	*/
2
3/*
4 * Copyright (C) 1997-2003 by Darren Reed.
5 *
6 * See the IPFILTER.LICENCE file for details on licencing.
7 *
8 * $FreeBSD: head/sys/contrib/ipfilter/netinet/ip_log.c 172776 2007-10-18 21:52:14Z darrenr $
9 * Id: ip_log.c,v 2.75.2.19 2007/09/09 11:32:06 darrenr Exp $
10 */
11#include <sys/param.h>
12#if defined(KERNEL) || defined(_KERNEL)
13# undef KERNEL
14# undef _KERNEL
15# define        KERNEL	1
16# define        _KERNEL	1
17#endif
18#if defined(__NetBSD__) && (NetBSD >= 199905) && !defined(IPFILTER_LKM) && \
19    defined(_KERNEL)
20# if (__NetBSD_Version__ < 399001400)
21#  include "opt_ipfilter_log.h"
22# else
23#  include "opt_ipfilter.h"
24# endif
25#endif
26#if defined(__FreeBSD__) && !defined(IPFILTER_LKM)
27# if defined(_KERNEL)
28#  if defined(__FreeBSD_version) && (__FreeBSD_version >= 300000)
29#   include "opt_ipfilter.h"
30#  endif
31# else
32#  include <osreldate.h>
33# endif
34#endif
35#ifndef SOLARIS
36# define SOLARIS (defined(sun) && (defined(__svr4__) || defined(__SVR4)))
37#endif
38#include <sys/errno.h>
39#include <sys/types.h>
40#include <sys/file.h>
41#ifndef _KERNEL
42# include <stdio.h>
43# include <string.h>
44# include <stdlib.h>
45# include <ctype.h>
46# define _KERNEL
47# define KERNEL
48# ifdef __OpenBSD__
49struct file;
50# endif
51# include <sys/uio.h>
52# undef _KERNEL
53# undef KERNEL
54#endif
55#if __FreeBSD_version >= 220000 && defined(_KERNEL)
56# include <sys/fcntl.h>
57# include <sys/filio.h>
58#else
59# include <sys/ioctl.h>
60#endif
61#include <sys/time.h>
62#if defined(_KERNEL)
63# include <sys/systm.h>
64# if defined(NetBSD) && (__NetBSD_Version__ >= 104000000)
65#  include <sys/proc.h>
66# endif
67#endif /* _KERNEL */
68#if !SOLARIS && !defined(__hpux) && !defined(linux)
69# if (defined(NetBSD) && NetBSD > 199609) || \
70     (defined(OpenBSD) && OpenBSD > 199603) || \
71     (__FreeBSD_version >= 300000)
72#  include <sys/dirent.h>
73# else
74#  include <sys/dir.h>
75# endif
76# include <sys/mbuf.h>
77# include <sys/select.h>
78# if __FreeBSD_version >= 500000
79#  include <sys/selinfo.h>
80# endif
81#else
82# if !defined(__hpux) && defined(_KERNEL)
83#  include <sys/filio.h>
84#  include <sys/cred.h>
85#  include <sys/ddi.h>
86#  include <sys/sunddi.h>
87#  include <sys/ksynch.h>
88#  include <sys/kmem.h>
89#  include <sys/mkdev.h>
90#  include <sys/dditypes.h>
91#  include <sys/cmn_err.h>
92# endif /* !__hpux */
93#endif /* !SOLARIS && !__hpux */
94#if !defined(linux)
95# include <sys/protosw.h>
96#endif
97#include <sys/socket.h>
98
99#include <net/if.h>
100#ifdef sun
101# include <net/af.h>
102#endif
103#if __FreeBSD_version >= 300000
104# include <net/if_var.h>
105#endif
106#include <net/route.h>
107#include <netinet/in.h>
108#ifdef __sgi
109# include <sys/ddi.h>
110# ifdef IFF_DRVRLOCK /* IRIX6 */
111#  include <sys/hashing.h>
112# endif
113#endif
114#if !defined(__hpux) && !defined(linux) && \
115    !(defined(__sgi) && !defined(IFF_DRVRLOCK)) /*IRIX<6*/
116# include <netinet/in_var.h>
117#endif
118#include <netinet/in_systm.h>
119#include <netinet/ip.h>
120#include <netinet/tcp.h>
121#include <netinet/udp.h>
122#include <netinet/ip_icmp.h>
123#ifdef USE_INET6
124# include <netinet/icmp6.h>
125#endif
126#if !defined(linux)
127# include <netinet/ip_var.h>
128#endif
129#ifndef _KERNEL
130# include <syslog.h>
131#endif
132#include "netinet/ip_compat.h"
133#include <netinet/tcpip.h>
134#include "netinet/ip_fil.h"
135#include "netinet/ip_nat.h"
136#include "netinet/ip_frag.h"
137#include "netinet/ip_state.h"
138#include "netinet/ip_auth.h"
139#if (__FreeBSD_version >= 300000) || defined(__NetBSD__)
140# include <sys/malloc.h>
141#endif
142/* END OF INCLUDES */
143
144#ifdef	IPFILTER_LOG
145
146# if defined(IPL_SELECT)
147#  include	<machine/sys/user.h>
148#  include	<sys/kthread_iface.h>
149#  define	READ_COLLISION	0x001
150
151iplog_select_t	iplog_ss[IPL_LOGMAX+1];
152
153extern int selwait;
154# endif /* IPL_SELECT */
155
156# if defined(linux) && defined(_KERNEL)
157wait_queue_head_t	iplh_linux[IPL_LOGSIZE];
158# endif
159# if SOLARIS && defined(_KERNEL)
160extern	kcondvar_t	iplwait;
161extern	struct pollhead	iplpollhead[IPL_LOGSIZE];
162# endif
163
164iplog_t	**iplh[IPL_LOGSIZE], *iplt[IPL_LOGSIZE], *ipll[IPL_LOGSIZE];
165int	iplused[IPL_LOGSIZE];
166static fr_info_t	iplcrc[IPL_LOGSIZE];
167int	ipl_suppress = 1;
168int	ipl_logmax = IPL_LOGMAX;
169int	ipl_logall = 0;
170int	ipl_log_init = 0;
171int	ipl_logsize = IPFILTER_LOGSIZE;
172int	ipl_magic[IPL_LOGSIZE] = { IPL_MAGIC, IPL_MAGIC_NAT, IPL_MAGIC_STATE,
173				   IPL_MAGIC, IPL_MAGIC, IPL_MAGIC,
174				   IPL_MAGIC, IPL_MAGIC };
175
176
177/* ------------------------------------------------------------------------ */
178/* Function:    fr_loginit                                                  */
179/* Returns:     int - 0 == success (always returned)                        */
180/* Parameters:  Nil                                                         */
181/*                                                                          */
182/* Initialise log buffers & pointers.  Also iniialised the CRC to a local   */
183/* secret for use in calculating the "last log checksum".                   */
184/* ------------------------------------------------------------------------ */
185int fr_loginit()
186{
187	int	i;
188
189	for (i = IPL_LOGMAX; i >= 0; i--) {
190		iplt[i] = NULL;
191		ipll[i] = NULL;
192		iplh[i] = &iplt[i];
193		iplused[i] = 0;
194		bzero((char *)&iplcrc[i], sizeof(iplcrc[i]));
195# ifdef	IPL_SELECT
196		iplog_ss[i].read_waiter = 0;
197		iplog_ss[i].state = 0;
198# endif
199# if defined(linux) && defined(_KERNEL)
200		init_waitqueue_head(iplh_linux + i);
201# endif
202	}
203
204# if SOLARIS && defined(_KERNEL)
205	cv_init(&iplwait, "ipl condvar", CV_DRIVER, NULL);
206# endif
207	MUTEX_INIT(&ipl_mutex, "ipf log mutex");
208
209	ipl_log_init = 1;
210
211	return 0;
212}
213
214
215/* ------------------------------------------------------------------------ */
216/* Function:    fr_logunload                                                */
217/* Returns:     Nil                                                         */
218/* Parameters:  Nil                                                         */
219/*                                                                          */
220/* Clean up any log data that has accumulated without being read.           */
221/* ------------------------------------------------------------------------ */
222void fr_logunload()
223{
224	int i;
225
226	if (ipl_log_init == 0)
227		return;
228
229	for (i = IPL_LOGMAX; i >= 0; i--)
230		(void) ipflog_clear(i);
231
232# if SOLARIS && defined(_KERNEL)
233	cv_destroy(&iplwait);
234# endif
235	MUTEX_DESTROY(&ipl_mutex);
236
237	ipl_log_init = 0;
238}
239
240
241/* ------------------------------------------------------------------------ */
242/* Function:    ipflog                                                      */
243/* Returns:     int - 0 == success, -1 == failure                           */
244/* Parameters:  fin(I)   - pointer to packet information                    */
245/*              flags(I) - flags from filter rules                          */
246/*                                                                          */
247/* Create a log record for a packet given that it has been triggered by a   */
248/* rule (or the default setting).  Calculate the transport protocol header  */
249/* size using predetermined size of a couple of popular protocols and thus  */
250/* how much data to copy into the log, including part of the data body if   */
251/* requested.                                                               */
252/* ------------------------------------------------------------------------ */
253int ipflog(fin, flags)
254fr_info_t *fin;
255u_int flags;
256{
257	register size_t hlen;
258	int types[2], mlen;
259	size_t sizes[2];
260	void *ptrs[2];
261	ipflog_t ipfl;
262	u_char p;
263	mb_t *m;
264# if (SOLARIS || defined(__hpux)) && defined(_KERNEL) && \
265  !defined(_INET_IP_STACK_H)
266	qif_t *ifp;
267# else
268	struct ifnet *ifp;
269# endif /* SOLARIS || __hpux */
270
271	m = fin->fin_m;
272	if (m == NULL)
273		return -1;
274
275	ipfl.fl_nattag.ipt_num[0] = 0;
276	ifp = fin->fin_ifp;
277	if (fin->fin_exthdr != NULL)
278		hlen = (char *)fin->fin_dp - (char *)fin->fin_ip;
279	else
280		hlen = fin->fin_hlen;
281	/*
282	 * calculate header size.
283	 */
284	if (fin->fin_off == 0) {
285		p = fin->fin_fi.fi_p;
286		if (p == IPPROTO_TCP)
287			hlen += MIN(sizeof(tcphdr_t), fin->fin_dlen);
288		else if (p == IPPROTO_UDP)
289			hlen += MIN(sizeof(udphdr_t), fin->fin_dlen);
290		else if (p == IPPROTO_ICMP) {
291			struct icmp *icmp;
292
293			icmp = (struct icmp *)fin->fin_dp;
294
295			/*
296			 * For ICMP, if the packet is an error packet, also
297			 * include the information about the packet which
298			 * caused the error.
299			 */
300			switch (icmp->icmp_type)
301			{
302			case ICMP_UNREACH :
303			case ICMP_SOURCEQUENCH :
304			case ICMP_REDIRECT :
305			case ICMP_TIMXCEED :
306			case ICMP_PARAMPROB :
307				hlen += MIN(sizeof(struct icmp) + 8,
308					    fin->fin_dlen);
309				break;
310			default :
311				hlen += MIN(sizeof(struct icmp),
312					    fin->fin_dlen);
313				break;
314			}
315		}
316# ifdef USE_INET6
317		else if (p == IPPROTO_ICMPV6) {
318			struct icmp6_hdr *icmp;
319
320			icmp = (struct icmp6_hdr *)fin->fin_dp;
321
322			/*
323			 * For ICMPV6, if the packet is an error packet, also
324			 * include the information about the packet which
325			 * caused the error.
326			 */
327			if (icmp->icmp6_type < 128) {
328				hlen += MIN(sizeof(struct icmp6_hdr) + 8,
329					    fin->fin_dlen);
330			} else {
331				hlen += MIN(sizeof(struct icmp6_hdr),
332					    fin->fin_dlen);
333			}
334		}
335# endif
336	}
337	/*
338	 * Get the interface number and name to which this packet is
339	 * currently associated.
340	 */
341# if (SOLARIS || defined(__hpux)) && defined(_KERNEL) && \
342     !defined(_INET_IP_STACK_H)
343	ipfl.fl_unit = (u_int)ifp->qf_ppa;
344	COPYIFNAME(fin->fin_v, ifp, ipfl.fl_ifname);
345# else
346#  if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199603)) || \
347      (defined(OpenBSD) && (OpenBSD >= 199603)) || defined(linux) || \
348      (defined(__FreeBSD__) && (__FreeBSD_version >= 501113)) || \
349      (SOLARIS && defined(_INET_IP_STACK_H))
350	COPYIFNAME(fin->fin_v, ifp, ipfl.fl_ifname);
351#  else
352	ipfl.fl_unit = (u_int)ifp->if_unit;
353#   if defined(_KERNEL)
354	if ((ipfl.fl_ifname[0] = ifp->if_name[0]))
355		if ((ipfl.fl_ifname[1] = ifp->if_name[1]))
356			if ((ipfl.fl_ifname[2] = ifp->if_name[2]))
357				ipfl.fl_ifname[3] = ifp->if_name[3];
358#   else
359	COPYIFNAME(fin->fin_v, ifp, ipfl.fl_ifname);
360	ipfl.fl_ifname[sizeof(ipfl.fl_ifname) - 1] = '\0';
361#   endif
362#  endif
363# endif /* __hpux || SOLARIS */
364	mlen = fin->fin_plen - hlen;
365	if (!ipl_logall) {
366		mlen = (flags & FR_LOGBODY) ? MIN(mlen, 128) : 0;
367	} else if ((flags & FR_LOGBODY) == 0) {
368		mlen = 0;
369	}
370	if (mlen < 0)
371		mlen = 0;
372	ipfl.fl_plen = (u_char)mlen;
373	ipfl.fl_hlen = (u_char)hlen;
374	ipfl.fl_rule = fin->fin_rule;
375	(void) strncpy(ipfl.fl_group, fin->fin_group, FR_GROUPLEN);
376	if (fin->fin_fr != NULL) {
377		ipfl.fl_loglevel = fin->fin_fr->fr_loglevel;
378		ipfl.fl_logtag = fin->fin_fr->fr_logtag;
379	} else {
380		ipfl.fl_loglevel = 0xffff;
381		ipfl.fl_logtag = FR_NOLOGTAG;
382	}
383	if (fin->fin_nattag != NULL)
384		bcopy(fin->fin_nattag, (void *)&ipfl.fl_nattag,
385		      sizeof(ipfl.fl_nattag));
386	ipfl.fl_flags = flags;
387	ipfl.fl_dir = fin->fin_out;
388	ipfl.fl_lflags = fin->fin_flx;
389	ptrs[0] = (void *)&ipfl;
390	sizes[0] = sizeof(ipfl);
391	types[0] = 0;
392# if defined(MENTAT) && defined(_KERNEL)
393	/*
394	 * Are we copied from the mblk or an aligned array ?
395	 */
396	if (fin->fin_ip == (ip_t *)m->b_rptr) {
397		ptrs[1] = m;
398		sizes[1] = hlen + mlen;
399		types[1] = 1;
400	} else {
401		ptrs[1] = fin->fin_ip;
402		sizes[1] = hlen + mlen;
403		types[1] = 0;
404	}
405# else
406	ptrs[1] = m;
407	sizes[1] = hlen + mlen;
408	types[1] = 1;
409# endif /* MENTAT */
410	return ipllog(IPL_LOGIPF, fin, ptrs, sizes, types, 2);
411}
412
413
414/* ------------------------------------------------------------------------ */
415/* Function:    ipllog                                                      */
416/* Returns:     int - 0 == success, -1 == failure                           */
417/* Parameters:  dev(I)    - device that owns this log record                */
418/*              fin(I)    - pointer to packet information                   */
419/*              items(I)  - array of pointers to log data                   */
420/*              itemsz(I) - array of size of valid memory pointed to        */
421/*              types(I)  - type of data pointed to by items pointers       */
422/*              cnt(I)    - number of elements in arrays items/itemsz/types */
423/*                                                                          */
424/* Takes an array of parameters and constructs one record to include the    */
425/* miscellaneous packet information, as well as packet data, for reading    */
426/* from the log device.                                                     */
427/* ------------------------------------------------------------------------ */
428int ipllog(dev, fin, items, itemsz, types, cnt)
429int dev;
430fr_info_t *fin;
431void **items;
432size_t *itemsz;
433int *types, cnt;
434{
435	u_char *buf, *ptr;
436	iplog_t *ipl;
437	size_t len;
438	int i;
439	SPL_INT(s);
440
441	/*
442	 * Check to see if this log record has a CRC which matches the last
443	 * record logged.  If it does, just up the count on the previous one
444	 * rather than create a new one.
445	 */
446	if (ipl_suppress) {
447		MUTEX_ENTER(&ipl_mutex);
448		if ((fin != NULL) && (fin->fin_off == 0)) {
449			if ((ipll[dev] != NULL) &&
450			    bcmp((char *)fin, (char *)&iplcrc[dev],
451				 FI_LCSIZE) == 0) {
452				ipll[dev]->ipl_count++;
453				MUTEX_EXIT(&ipl_mutex);
454				return 0;
455			}
456			bcopy((char *)fin, (char *)&iplcrc[dev], FI_LCSIZE);
457		} else
458			bzero((char *)&iplcrc[dev], FI_CSIZE);
459		MUTEX_EXIT(&ipl_mutex);
460	}
461
462	/*
463	 * Get the total amount of data to be logged.
464	 */
465	for (i = 0, len = sizeof(iplog_t); i < cnt; i++)
466		len += itemsz[i];
467
468	/*
469	 * check that we have space to record this information and can
470	 * allocate that much.
471	 */
472	KMALLOCS(buf, u_char *, len);
473	if (buf == NULL)
474		return -1;
475	SPL_NET(s);
476	MUTEX_ENTER(&ipl_mutex);
477	if ((iplused[dev] + len) > ipl_logsize) {
478		MUTEX_EXIT(&ipl_mutex);
479		SPL_X(s);
480		KFREES(buf, len);
481		return -1;
482	}
483	iplused[dev] += len;
484	MUTEX_EXIT(&ipl_mutex);
485	SPL_X(s);
486
487	/*
488	 * advance the log pointer to the next empty record and deduct the
489	 * amount of space we're going to use.
490	 */
491	ipl = (iplog_t *)buf;
492	ipl->ipl_magic = ipl_magic[dev];
493	ipl->ipl_count = 1;
494	ipl->ipl_next = NULL;
495	ipl->ipl_dsize = len;
496#ifdef _KERNEL
497	GETKTIME(&ipl->ipl_sec);
498#else
499	ipl->ipl_sec = 0;
500	ipl->ipl_usec = 0;
501#endif
502
503	/*
504	 * Loop through all the items to be logged, copying each one to the
505	 * buffer.  Use bcopy for normal data or the mb_t copyout routine.
506	 */
507	for (i = 0, ptr = buf + sizeof(*ipl); i < cnt; i++) {
508		if (types[i] == 0) {
509			bcopy(items[i], ptr, itemsz[i]);
510		} else if (types[i] == 1) {
511			COPYDATA(items[i], 0, itemsz[i], (char *)ptr);
512		}
513		ptr += itemsz[i];
514	}
515	SPL_NET(s);
516	MUTEX_ENTER(&ipl_mutex);
517	ipll[dev] = ipl;
518	*iplh[dev] = ipl;
519	iplh[dev] = &ipl->ipl_next;
520
521	/*
522	 * Now that the log record has been completed and added to the queue,
523	 * wake up any listeners who may want to read it.
524	 */
525# if SOLARIS && defined(_KERNEL)
526	cv_signal(&iplwait);
527	MUTEX_EXIT(&ipl_mutex);
528	pollwakeup(&iplpollhead[dev], POLLRDNORM);
529# else
530	MUTEX_EXIT(&ipl_mutex);
531	WAKEUP(iplh, dev);
532	POLLWAKEUP(dev);
533# endif
534	SPL_X(s);
535# ifdef	IPL_SELECT
536	iplog_input_ready(dev);
537# endif
538	return 0;
539}
540
541
542/* ------------------------------------------------------------------------ */
543/* Function:    ipflog_read                                                 */
544/* Returns:     int    - 0 == success, else error value.                    */
545/* Parameters:  unit(I) - device we are reading from                        */
546/*              uio(O)  - pointer to information about where to store data  */
547/*                                                                          */
548/* Called to handle a read on an IPFilter device.  Returns only complete    */
549/* log messages - will not partially copy a log record out to userland.     */
550/*                                                                          */
551/* NOTE: This function will block and wait for a signal to return data if   */
552/* there is none present.  Asynchronous I/O is not implemented.             */
553/* ------------------------------------------------------------------------ */
554int ipflog_read(unit, uio)
555minor_t unit;
556struct uio *uio;
557{
558	size_t dlen, copied;
559	int error = 0;
560	iplog_t *ipl;
561	SPL_INT(s);
562
563	/*
564	 * Sanity checks.  Make sure the minor # is valid and we're copying
565	 * a valid chunk of data.
566	 */
567	if (IPL_LOGMAX < unit)
568		return ENXIO;
569	if (uio->uio_resid == 0)
570		return 0;
571	if ((uio->uio_resid < sizeof(iplog_t)) ||
572	    (uio->uio_resid > ipl_logsize))
573		return EINVAL;
574
575	/*
576	 * Lock the log so we can snapshot the variables.  Wait for a signal
577	 * if the log is empty.
578	 */
579	SPL_NET(s);
580	MUTEX_ENTER(&ipl_mutex);
581
582	while (iplt[unit] == NULL) {
583# if SOLARIS && defined(_KERNEL)
584		if (!cv_wait_sig(&iplwait, &ipl_mutex.ipf_lk)) {
585			MUTEX_EXIT(&ipl_mutex);
586			return EINTR;
587		}
588# else
589#  if defined(__hpux) && defined(_KERNEL)
590		lock_t *l;
591
592#   ifdef IPL_SELECT
593		if (uio->uio_fpflags & (FNBLOCK|FNDELAY)) {
594			/* this is no blocking system call */
595			MUTEX_EXIT(&ipl_mutex);
596			return 0;
597		}
598#   endif
599
600		MUTEX_EXIT(&ipl_mutex);
601		l = get_sleep_lock(&iplh[unit]);
602		error = sleep(&iplh[unit], PZERO+1);
603		spinunlock(l);
604#  else
605#   if defined(__osf__) && defined(_KERNEL)
606		error = mpsleep(&iplh[unit], PSUSP|PCATCH,  "iplread", 0,
607				&ipl_mutex, MS_LOCK_SIMPLE);
608#   else
609		MUTEX_EXIT(&ipl_mutex);
610		SPL_X(s);
611		error = SLEEP(unit + iplh, "ipl sleep");
612#   endif /* __osf__ */
613#  endif /* __hpux */
614		if (error)
615			return error;
616		SPL_NET(s);
617		MUTEX_ENTER(&ipl_mutex);
618# endif /* SOLARIS */
619	}
620
621# if (BSD >= 199101) || defined(__FreeBSD__) || defined(__osf__)
622	uio->uio_rw = UIO_READ;
623# endif
624
625	for (copied = 0; (ipl = iplt[unit]) != NULL; copied += dlen) {
626		dlen = ipl->ipl_dsize;
627		if (dlen > uio->uio_resid)
628			break;
629		/*
630		 * Don't hold the mutex over the uiomove call.
631		 */
632		iplt[unit] = ipl->ipl_next;
633		iplused[unit] -= dlen;
634		MUTEX_EXIT(&ipl_mutex);
635		SPL_X(s);
636		error = UIOMOVE(ipl, dlen, UIO_READ, uio);
637		if (error) {
638			SPL_NET(s);
639			MUTEX_ENTER(&ipl_mutex);
640			ipl->ipl_next = iplt[unit];
641			iplt[unit] = ipl;
642			iplused[unit] += dlen;
643			break;
644		}
645		MUTEX_ENTER(&ipl_mutex);
646		KFREES(ipl, dlen);
647		SPL_NET(s);
648	}
649	if (!iplt[unit]) {
650		iplused[unit] = 0;
651		iplh[unit] = &iplt[unit];
652		ipll[unit] = NULL;
653	}
654
655	MUTEX_EXIT(&ipl_mutex);
656	SPL_X(s);
657	return error;
658}
659
660
661/* ------------------------------------------------------------------------ */
662/* Function:    ipflog_clear                                                */
663/* Returns:     int    - number of log bytes cleared.                       */
664/* Parameters:  unit(I) - device we are reading from                        */
665/*                                                                          */
666/* Deletes all queued up log records for a given output device.             */
667/* ------------------------------------------------------------------------ */
668int ipflog_clear(unit)
669minor_t unit;
670{
671	iplog_t *ipl;
672	int used;
673	SPL_INT(s);
674
675	SPL_NET(s);
676	MUTEX_ENTER(&ipl_mutex);
677	while ((ipl = iplt[unit]) != NULL) {
678		iplt[unit] = ipl->ipl_next;
679		KFREES(ipl, ipl->ipl_dsize);
680	}
681	iplh[unit] = &iplt[unit];
682	ipll[unit] = NULL;
683	used = iplused[unit];
684	iplused[unit] = 0;
685	bzero((char *)&iplcrc[unit], FI_CSIZE);
686	MUTEX_EXIT(&ipl_mutex);
687	SPL_X(s);
688	return used;
689}
690
691
692/* ------------------------------------------------------------------------ */
693/* Function:    ipflog_canread                                              */
694/* Returns:     int    - 0 == no data to read, 1 = data present             */
695/* Parameters:  unit(I) - device we are reading from                        */
696/*                                                                          */
697/* Returns an indication of whether or not there is data present in the     */
698/* current buffer for the selected ipf device.                              */
699/* ------------------------------------------------------------------------ */
700int ipflog_canread(unit)
701int unit;
702{
703	return iplt[unit] != NULL;
704}
705#endif /* IPFILTER_LOG */
706