Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 13 Nov 2023 09:39:50 GMT
From:      Kristof Provost <kp@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 81e8bb983432 - main - net/miniupnpd: use libpfctl
Message-ID:  <202311130939.3AD9do6h076676@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by kp:

URL: https://cgit.FreeBSD.org/ports/commit/?id=81e8bb983432251d47c3447bf6c1572fa0a84501

commit 81e8bb983432251d47c3447bf6c1572fa0a84501
Author:     Kristof Provost <kp@FreeBSD.org>
AuthorDate: 2023-10-30 16:23:10 +0000
Commit:     Kristof Provost <kp@FreeBSD.org>
CommitDate: 2023-11-13 09:39:43 +0000

    net/miniupnpd: use libpfctl
    
    Start using libpfctl to replace the removed ioctl calls (DIOCGETSTATUS,
    DIOCGETRULE).
    
    PR:             274819
    Approved by:    maintainer timeout
    Sponsored by:   Rubicon Communications, LLC ("Netgate")
---
 net/miniupnpd/Makefile                   |   8 +-
 net/miniupnpd/files/patch-pf_obsdrdr.c   | 368 +++++++++++++++++++++++++++++++
 net/miniupnpd/files/patch-pf_pfpinhole.c | 160 ++++++++++++++
 3 files changed, 533 insertions(+), 3 deletions(-)

diff --git a/net/miniupnpd/Makefile b/net/miniupnpd/Makefile
index 1c9e6e87aebd..4c9a2ea1e505 100644
--- a/net/miniupnpd/Makefile
+++ b/net/miniupnpd/Makefile
@@ -1,6 +1,6 @@
 PORTNAME=	miniupnpd
 DISTVERSION=	2.3.3
-PORTREVISION=	1
+PORTREVISION=	2
 PORTEPOCH=	1
 CATEGORIES=	net
 
@@ -10,7 +10,9 @@ WWW=		http://miniupnp.free.fr/
 
 LICENSE=	BSD3CLAUSE
 
-USES=		cpe ssl
+LIB_DEPENDS=   libpfctl.so:net/libpfctl
+
+USES=		cpe ssl localbase:ldflags
 CPE_VENDOR=	miniupnp_project
 
 USE_GITHUB=	yes
@@ -24,7 +26,7 @@ HAS_CONFIGURE=	yes
 MAKE_JOBS_UNSAFE=	yes
 
 CFLAGS+=	-I${OPENSSLINC}
-LDFLAGS+=	-L${OPENSSLLIB}
+LDFLAGS+=	-L${OPENSSLLIB} -lpfctl
 
 WRKSRC_SUBDIR=	miniupnpd
 
diff --git a/net/miniupnpd/files/patch-pf_obsdrdr.c b/net/miniupnpd/files/patch-pf_obsdrdr.c
new file mode 100644
index 000000000000..0f245db26a1b
--- /dev/null
+++ b/net/miniupnpd/files/patch-pf_obsdrdr.c
@@ -0,0 +1,368 @@
+--- pf/obsdrdr.c.orig	2023-02-17 03:09:33 UTC
++++ pf/obsdrdr.c
+@@ -64,6 +64,8 @@
+ #include <stdio.h>
+ #include <stdlib.h>
+ 
++#include <libpfctl.h>
++
+ #include "../macros.h"
+ #include "config.h"
+ #include "obsdrdr.h"
+@@ -154,7 +156,7 @@ init_redirect(void)
+ int
+ init_redirect(void)
+ {
+-	struct pf_status status;
++	struct pfctl_status *status;
+ 	if(dev>=0)
+ 		shutdown_redirect();
+ 	dev = open("/dev/pf", O_RDWR);
+@@ -162,14 +164,16 @@ init_redirect(void)
+ 		syslog(LOG_ERR, "open(\"/dev/pf\"): %m");
+ 		return -1;
+ 	}
+-	if(ioctl(dev, DIOCGETSTATUS, &status)<0) {
++	if ((status = pfctl_get_status(dev)) == NULL) {
+ 		syslog(LOG_ERR, "DIOCGETSTATUS: %m");
+ 		return -1;
+ 	}
+-	if(!status.running) {
++	if(!status->running) {
++		pfctl_free_status(status);
+ 		syslog(LOG_ERR, "pf is disabled");
+ 		return -1;
+ 	}
++	pfctl_free_status(status);
+ 	return 0;
+ }
+ 
+@@ -464,6 +468,7 @@ delete_nat_rule(const char * ifname, unsigned short ip
+ {
+ 	int i, n;
+ 	struct pfioc_rule pr;
++	struct pfctl_rule rule;
+ 	UNUSED(ifname);
+ 	if(dev<0) {
+ 		syslog(LOG_ERR, "pf device is not open");
+@@ -486,19 +491,19 @@ delete_nat_rule(const char * ifname, unsigned short ip
+ 	for(i=0; i<n; i++)
+ 	{
+ 		pr.nr = i;
+-		if(ioctl(dev, DIOCGETRULE, &pr) < 0)
++		if (pfctl_get_rule(dev, i, pr.ticket, pr.anchor, pr.action, &rule, pr.anchor_call) < 0)
+ 		{
+ 			syslog(LOG_ERR, "ioctl(dev, DIOCGETRULE): %m");
+ 			goto error;
+ 		}
+ #ifdef TEST
+ 		syslog(LOG_DEBUG, "%2d port=%hu proto=%d addr=%8x    %8x",
+-		       i, ntohs(pr.rule.src.port[0]), pr.rule.proto,
+-		       pr.rule.src.addr.v.a.addr.v4.s_addr, iaddr);
++		       i, ntohs(rule.src.port[0]), rule.proto,
++		       rule.src.addr.v.a.addr.v4.s_addr, iaddr);
+ #endif /* TEST */
+-		if(iport == ntohs(pr.rule.src.port[0])
+-		 && pr.rule.proto == proto
+-		 && iaddr == pr.rule.src.addr.v.a.addr.v4.s_addr)
++		if(iport == ntohs(rule.src.port[0])
++		 && rule.proto == proto
++		 && iaddr == rule.src.addr.v.a.addr.v4.s_addr)
+ 		{
+ 			pr.action = PF_CHANGE_GET_TICKET;
+ 			if(ioctl(dev, DIOCCHANGERULE, &pr) < 0)
+@@ -843,6 +848,7 @@ get_redirect_rule(const char * ifname, unsigned short 
+ {
+ 	int i, n;
+ 	struct pfioc_rule pr;
++	struct pfctl_rule rule;
+ #ifndef PF_NEWSTYLE
+ 	struct pfioc_pooladdr pp;
+ #endif
+@@ -866,37 +872,37 @@ get_redirect_rule(const char * ifname, unsigned short 
+ 	for(i=0; i<n; i++)
+ 	{
+ 		pr.nr = i;
+-		if(ioctl(dev, DIOCGETRULE, &pr) < 0)
++		if (pfctl_get_rule(dev, i, pr.ticket, pr.anchor, pr.action, &rule, pr.anchor_call) < 0)
+ 		{
+ 			syslog(LOG_ERR, "ioctl(dev, DIOCGETRULE): %m");
+ 			goto error;
+ 		}
+ #ifdef __APPLE__
+-		if( (eport == ntohs(pr.rule.dst.xport.range.port[0]))
+-		  && (eport == ntohs(pr.rule.dst.xport.range.port[1]))
++		if( (eport == ntohs(rule.dst.xport.range.port[0]))
++		  && (eport == ntohs(rule.dst.xport.range.port[1]))
+ #else
+-		if( (eport == ntohs(pr.rule.dst.port[0]))
+-		  && (eport == ntohs(pr.rule.dst.port[1]))
++		if( (eport == ntohs(rule.dst.port[0]))
++		  && (eport == ntohs(rule.dst.port[1]))
+ #endif
+-		  && (pr.rule.proto == proto) )
++		  && (rule.proto == proto) )
+ 		{
+ #ifndef PF_NEWSTYLE
+-			*iport = pr.rule.rpool.proxy_port[0];
++			*iport = rule.rpool.proxy_port[0];
+ #else
+-			*iport = pr.rule.rdr.proxy_port[0];
++			*iport = rule.rdr.proxy_port[0];
+ #endif
+ 			if(desc)
+-				strlcpy(desc, pr.rule.label, desclen);
++				strlcpy(desc, rule.label[0], desclen);
+ #ifdef PFRULE_INOUT_COUNTS
+ 			if(packets)
+-				*packets = pr.rule.packets[0] + pr.rule.packets[1];
++				*packets = rule.packets[0] + rule.packets[1];
+ 			if(bytes)
+-				*bytes = pr.rule.bytes[0] + pr.rule.bytes[1];
++				*bytes = rule.bytes[0] + rule.bytes[1];
+ #else
+ 			if(packets)
+-				*packets = pr.rule.packets;
++				*packets = rule.packets;
+ 			if(bytes)
+-				*bytes = pr.rule.bytes;
++				*bytes = rule.bytes;
+ #endif
+ #ifndef PF_NEWSTYLE
+ 			memset(&pp, 0, sizeof(pp));
+@@ -928,15 +934,15 @@ get_redirect_rule(const char * ifname, unsigned short 
+ 			          iaddr, iaddrlen);
+ #endif
+ #else
+-			inet_ntop(AF_INET, &pr.rule.rdr.addr.v.a.addr.v4.s_addr,
++			inet_ntop(AF_INET, &rule.rdr.addr.v.a.addr.v4.s_addr,
+ 			          iaddr, iaddrlen);
+ #endif
+ 			if(rhost && rhostlen > 0)
+ 			{
+ #ifdef PFVAR_NEW_STYLE
+-				if (pr.rule.src.addr.v.a.addr.v4addr.s_addr == 0)
++				if (rule.src.addr.v.a.addr.v4addr.s_addr == 0)
+ #else
+-				if (pr.rule.src.addr.v.a.addr.v4.s_addr == 0)
++				if (rule.src.addr.v.a.addr.v4.s_addr == 0)
+ #endif
+ 				{
+ 					rhost[0] = '\0'; /* empty string */
+@@ -944,10 +950,10 @@ get_redirect_rule(const char * ifname, unsigned short 
+ 				else
+ 				{
+ #ifdef PFVAR_NEW_STYLE
+-					inet_ntop(AF_INET, &pr.rule.src.addr.v.a.addr.v4addr.s_addr,
++					inet_ntop(AF_INET, &rule.src.addr.v.a.addr.v4addr.s_addr,
+ 					          rhost, rhostlen);
+ #else
+-					inet_ntop(AF_INET, &pr.rule.src.addr.v.a.addr.v4.s_addr,
++					inet_ntop(AF_INET, &rule.src.addr.v.a.addr.v4.s_addr,
+ 					          rhost, rhostlen);
+ #endif
+ 				}
+@@ -978,6 +984,7 @@ priv_delete_redirect_rule_check_desc(const char * ifna
+ {
+ 	int i, n;
+ 	struct pfioc_rule pr;
++	struct pfctl_rule rule;
+ 	UNUSED(ifname);
+ 
+ 	if(dev<0) {
+@@ -998,23 +1005,23 @@ priv_delete_redirect_rule_check_desc(const char * ifna
+ 	for(i=0; i<n; i++)
+ 	{
+ 		pr.nr = i;
+-		if(ioctl(dev, DIOCGETRULE, &pr) < 0)
++		if (pfctl_get_rule(dev, i, pr.ticket, pr.anchor, pr.action, &rule, pr.anchor_call) < 0)
+ 		{
+ 			syslog(LOG_ERR, "ioctl(dev, DIOCGETRULE): %m");
+ 			goto error;
+ 		}
+ #ifdef __APPLE__
+-		if( (eport == ntohs(pr.rule.dst.xport.range.port[0]))
+-		  && (eport == ntohs(pr.rule.dst.xport.range.port[1]))
++		if( (eport == ntohs(rule.dst.xport.range.port[0]))
++		  && (eport == ntohs(rule.dst.xport.range.port[1]))
+ #else
+-		if( (eport == ntohs(pr.rule.dst.port[0]))
+-		  && (eport == ntohs(pr.rule.dst.port[1]))
++		if( (eport == ntohs(rule.dst.port[0]))
++		  && (eport == ntohs(rule.dst.port[1]))
+ #endif
+-		  && (pr.rule.proto == proto) )
++		  && (rule.proto == proto) )
+ 		{
+ 			/* retrieve iport in order to remove filter rule */
+ #ifndef PF_NEWSTYLE
+-			if(iport) *iport = pr.rule.rpool.proxy_port[0];
++			if(iport) *iport = rule.rpool.proxy_port[0];
+ 			if(iaddr)
+ 			{
+ 				/* retrieve internal address */
+@@ -1047,33 +1054,33 @@ priv_delete_redirect_rule_check_desc(const char * ifna
+ #endif
+ 			}
+ #else
+-			if(iport) *iport = pr.rule.rdr.proxy_port[0];
++			if(iport) *iport = rule.rdr.proxy_port[0];
+ 			if(iaddr)
+ 			{
+ 				/* retrieve internal address */
+-				*iaddr = pr.rule.rdr.addr.v.a.addr.v4.s_addr;
++				*iaddr = rule.rdr.addr.v.a.addr.v4.s_addr;
+ 			}
+ #endif
+ 			if(rhost && rhostlen > 0)
+ 			{
+ #ifdef PFVAR_NEW_STYLE
+-				if (pr.rule.src.addr.v.a.addr.v4addr.s_addr == 0)
++				if (rule.src.addr.v.a.addr.v4addr.s_addr == 0)
+ #else
+-				if (pr.rule.src.addr.v.a.addr.v4.s_addr == 0)
++				if (rule.src.addr.v.a.addr.v4.s_addr == 0)
+ #endif
+ 					rhost[0] = '\0'; /* empty string */
+ 				else
+ #ifdef PFVAR_NEW_STYLE
+-					inet_ntop(AF_INET, &pr.rule.src.addr.v.a.addr.v4addr.s_addr,
++					inet_ntop(AF_INET, &rule.src.addr.v.a.addr.v4addr.s_addr,
+ 					          rhost, rhostlen);
+ #else
+-					inet_ntop(AF_INET, &pr.rule.src.addr.v.a.addr.v4.s_addr,
++					inet_ntop(AF_INET, &rule.src.addr.v.a.addr.v4.s_addr,
+ 					          rhost, rhostlen);
+ #endif
+ 			}
+ 			if(check_desc) {
+-				if((desc == NULL && pr.rule.label[0] == '\0') ||
+-				   (desc && 0 == strcmp(desc, pr.rule.label))) {
++				if((desc == NULL && rule.label[0][0] == '\0') ||
++				   (desc && 0 == strcmp(desc, rule.label[0]))) {
+ 					return 1;
+ 				}
+ 			}
+@@ -1208,6 +1215,7 @@ get_redirect_rule_by_index(int index,
+ {
+ 	int n;
+ 	struct pfioc_rule pr;
++	struct pfctl_rule rule;
+ #ifndef PF_NEWSTYLE
+ 	struct pfioc_pooladdr pp;
+ #endif
+@@ -1231,36 +1239,36 @@ get_redirect_rule_by_index(int index,
+ 	if(index >= n)
+ 		goto error;
+ 	pr.nr = index;
+-	if(ioctl(dev, DIOCGETRULE, &pr) < 0)
++	if (pfctl_get_rule(dev, index, pr.ticket, pr.anchor, pr.action, &rule, pr.anchor_call) < 0)
+ 	{
+ 		syslog(LOG_ERR, "ioctl(dev, DIOCGETRULE): %m");
+ 		goto error;
+ 	}
+-	*proto = pr.rule.proto;
++	*proto = rule.proto;
+ #ifdef __APPLE__
+-	*eport = ntohs(pr.rule.dst.xport.range.port[0]);
++	*eport = ntohs(rule.dst.xport.range.port[0]);
+ #else
+-	*eport = ntohs(pr.rule.dst.port[0]);
++	*eport = ntohs(rule.dst.port[0]);
+ #endif
+ #ifndef PF_NEWSTYLE
+-	*iport = pr.rule.rpool.proxy_port[0];
++	*iport = rule.rpool.proxy_port[0];
+ #else
+-	*iport = pr.rule.rdr.proxy_port[0];
++	*iport = rule.rdr.proxy_port[0];
+ #endif
+ 	if(ifname)
+-		strlcpy(ifname, pr.rule.ifname, IFNAMSIZ);
++		strlcpy(ifname, rule.ifname, IFNAMSIZ);
+ 	if(desc)
+-		strlcpy(desc, pr.rule.label, desclen);
++		strlcpy(desc, rule.label[0], desclen);
+ #ifdef PFRULE_INOUT_COUNTS
+ 	if(packets)
+-		*packets = pr.rule.packets[0] + pr.rule.packets[1];
++		*packets = rule.packets[0] + rule.packets[1];
+ 	if(bytes)
+-		*bytes = pr.rule.bytes[0] + pr.rule.bytes[1];
++		*bytes = rule.bytes[0] + rule.bytes[1];
+ #else
+ 	if(packets)
+-		*packets = pr.rule.packets;
++		*packets = rule.packets;
+ 	if(bytes)
+-		*bytes = pr.rule.bytes;
++		*bytes = rule.bytes;
+ #endif
+ #ifndef PF_NEWSTYLE
+ 	memset(&pp, 0, sizeof(pp));
+@@ -1292,15 +1300,15 @@ get_redirect_rule_by_index(int index,
+ 	          iaddr, iaddrlen);
+ #endif
+ #else
+-	inet_ntop(AF_INET, &pr.rule.rdr.addr.v.a.addr.v4.s_addr,
++	inet_ntop(AF_INET, &rule.rdr.addr.v.a.addr.v4.s_addr,
+ 	          iaddr, iaddrlen);
+ #endif
+ 	if(rhost && rhostlen > 0)
+ 	{
+ #ifdef PFVAR_NEW_STYLE
+-		if (pr.rule.src.addr.v.a.addr.v4addr.s_addr == 0)
++		if (rule.src.addr.v.a.addr.v4addr.s_addr == 0)
+ #else
+-		if (pr.rule.src.addr.v.a.addr.v4.s_addr == 0)
++		if (rule.src.addr.v.a.addr.v4.s_addr == 0)
+ #endif
+ 		{
+ 			rhost[0] = '\0'; /* empty string */
+@@ -1308,10 +1316,10 @@ get_redirect_rule_by_index(int index,
+ 		else
+ 		{
+ #ifdef PFVAR_NEW_STYLE
+-			inet_ntop(AF_INET, &pr.rule.src.addr.v.a.addr.v4addr.s_addr,
++			inet_ntop(AF_INET, &rule.src.addr.v.a.addr.v4addr.s_addr,
+ 			          rhost, rhostlen);
+ #else
+-			inet_ntop(AF_INET, &pr.rule.src.addr.v.a.addr.v4.s_addr,
++			inet_ntop(AF_INET, &rule.src.addr.v.a.addr.v4.s_addr,
+ 			          rhost, rhostlen);
+ #endif
+ 		}
+@@ -1334,6 +1342,7 @@ get_portmappings_in_range(unsigned short startport, un
+ 	int i, n;
+ 	unsigned short eport;
+ 	struct pfioc_rule pr;
++	struct pfctl_rule rule;
+ 
+ 	*number = 0;
+ 	if(dev<0) {
+@@ -1362,19 +1371,19 @@ get_portmappings_in_range(unsigned short startport, un
+ 	for(i=0; i<n; i++)
+ 	{
+ 		pr.nr = i;
+-		if(ioctl(dev, DIOCGETRULE, &pr) < 0)
++		if (pfctl_get_rule(dev, i, pr.ticket, pr.anchor, pr.action, &rule, pr.anchor_call) < 0)
+ 		{
+ 			syslog(LOG_ERR, "ioctl(dev, DIOCGETRULE): %m");
+ 			continue;
+ 		}
+ #ifdef __APPLE__
+-		eport = ntohs(pr.rule.dst.xport.range.port[0]);
+-		if( (eport == ntohs(pr.rule.dst.xport.range.port[1]))
++		eport = ntohs(rule.dst.xport.range.port[0]);
++		if( (eport == ntohs(rule.dst.xport.range.port[1]))
+ #else
+-		eport = ntohs(pr.rule.dst.port[0]);
+-		if( (eport == ntohs(pr.rule.dst.port[1]))
++		eport = ntohs(rule.dst.port[0]);
++		if( (eport == ntohs(rule.dst.port[1]))
+ #endif
+-		  && (pr.rule.proto == proto)
++		  && (rule.proto == proto)
+ 		  && (startport <= eport) && (eport <= endport) )
+ 		{
+ 			if(*number >= capacity)
diff --git a/net/miniupnpd/files/patch-pf_pfpinhole.c b/net/miniupnpd/files/patch-pf_pfpinhole.c
new file mode 100644
index 000000000000..9605ab3fd4a7
--- /dev/null
+++ b/net/miniupnpd/files/patch-pf_pfpinhole.c
@@ -0,0 +1,160 @@
+--- pf/pfpinhole.c.orig	2023-10-30 16:24:29 UTC
++++ pf/pfpinhole.c
+@@ -28,6 +28,7 @@
+ #include <syslog.h>
+ #include <stdio.h>
+ #include <stdlib.h>
++#include <libpfctl.h>
+ 
+ #include "config.h"
+ #include "pfpinhole.h"
+@@ -170,6 +171,7 @@ int find_pinhole(const char * ifname,
+ 	unsigned int ts;
+ 	int i, n;
+ 	struct pfioc_rule pr;
++	struct pfctl_rule rule;
+ 	struct in6_addr saddr;
+ 	struct in6_addr daddr;
+ 	UNUSED(ifname);
+@@ -196,21 +198,21 @@ int find_pinhole(const char * ifname,
+ 	n = pr.nr;
+ 	for(i=0; i<n; i++) {
+ 		pr.nr = i;
+-		if(ioctl(dev, DIOCGETRULE, &pr) < 0) {
++		if (pfctl_get_rule(dev, i, pr.ticket, pr.anchor, pr.action, &rule, pr.anchor_call) < 0) {
+ 			syslog(LOG_ERR, "ioctl(dev, DIOCGETRULE): %m");
+ 			return -1;
+ 		}
+-		if((proto == pr.rule.proto) && (rem_port == ntohs(pr.rule.src.port[0]))
+-		   && (0 == memcmp(&saddr, &pr.rule.src.addr.v.a.addr.v6, sizeof(struct in6_addr)))
+-		   && (int_port == ntohs(pr.rule.dst.port[0])) &&
+-		   (0 == memcmp(&daddr, &pr.rule.dst.addr.v.a.addr.v6, sizeof(struct in6_addr)))) {
+-			if(sscanf(pr.rule.label, PINEHOLE_LABEL_FORMAT_SKIPDESC, &uid, &ts) != 2) {
+-				syslog(LOG_DEBUG, "rule with label '%s' is not a IGD pinhole", pr.rule.label);
++		if((proto == rule.proto) && (rem_port == ntohs(rule.src.port[0]))
++		   && (0 == memcmp(&saddr, &rule.src.addr.v.a.addr.v6, sizeof(struct in6_addr)))
++		   && (int_port == ntohs(rule.dst.port[0])) &&
++		   (0 == memcmp(&daddr, &rule.dst.addr.v.a.addr.v6, sizeof(struct in6_addr)))) {
++			if(sscanf(rule.label[0], PINEHOLE_LABEL_FORMAT_SKIPDESC, &uid, &ts) != 2) {
++				syslog(LOG_DEBUG, "rule with label '%s' is not a IGD pinhole", rule.label[0]);
+ 				continue;
+ 			}
+ 			if(timestamp) *timestamp = ts;
+ 			if(desc) {
+-				char * p = strchr(pr.rule.label, ':');
++				char * p = strchr(rule.label[0], ':');
+ 				if(p) {
+ 					p += 2;
+ 					strlcpy(desc, p, desc_len);
+@@ -226,6 +228,7 @@ int delete_pinhole(unsigned short uid)
+ {
+ 	int i, n;
+ 	struct pfioc_rule pr;
++	struct pfctl_rule rule;
+ 	char label_start[PF_RULE_LABEL_SIZE];
+ 	char tmp_label[PF_RULE_LABEL_SIZE];
+ 
+@@ -247,11 +250,11 @@ int delete_pinhole(unsigned short uid)
+ 	n = pr.nr;
+ 	for(i=0; i<n; i++) {
+ 		pr.nr = i;
+-		if(ioctl(dev, DIOCGETRULE, &pr) < 0) {
++		if (pfctl_get_rule(dev, i, pr.ticket, pr.anchor, pr.action, &rule, pr.anchor_call) < 0) {
+ 			syslog(LOG_ERR, "ioctl(dev, DIOCGETRULE): %m");
+ 			return -1;
+ 		}
+-		strlcpy(tmp_label, pr.rule.label, sizeof(tmp_label));
++		strlcpy(tmp_label, rule.label[0], sizeof(tmp_label));
+ 		strtok(tmp_label, " ");
+ 		if(0 == strcmp(tmp_label, label_start)) {
+ 			pr.action = PF_CHANGE_GET_TICKET;
+@@ -282,6 +285,7 @@ get_pinhole_info(unsigned short uid,
+ {
+ 	int i, n;
+ 	struct pfioc_rule pr;
++	struct pfctl_rule rule;
+ 	char label_start[PF_RULE_LABEL_SIZE];
+ 	char tmp_label[PF_RULE_LABEL_SIZE];
+ 	char * p;
+@@ -304,26 +308,26 @@ get_pinhole_info(unsigned short uid,
+ 	n = pr.nr;
+ 	for(i=0; i<n; i++) {
+ 		pr.nr = i;
+-		if(ioctl(dev, DIOCGETRULE, &pr) < 0) {
++		if (pfctl_get_rule(dev, i, pr.ticket, pr.anchor, pr.action, &rule, pr.anchor_call) < 0) {
+ 			syslog(LOG_ERR, "ioctl(dev, DIOCGETRULE): %m");
+ 			return -1;
+ 		}
+-		strlcpy(tmp_label, pr.rule.label, sizeof(tmp_label));
++		strlcpy(tmp_label, rule.label[0], sizeof(tmp_label));
+ 		p = tmp_label;
+ 		strsep(&p, " ");
+ 		if(0 == strcmp(tmp_label, label_start)) {
+-			if(rem_host && (inet_ntop(AF_INET6, &pr.rule.src.addr.v.a.addr.v6, rem_host, rem_hostlen) == NULL)) {
++			if(rem_host && (inet_ntop(AF_INET6, &rule.src.addr.v.a.addr.v6, rem_host, rem_hostlen) == NULL)) {
+ 				return -1;
+ 			}
+ 			if(rem_port)
+-				*rem_port = ntohs(pr.rule.src.port[0]);
+-			if(int_client && (inet_ntop(AF_INET6, &pr.rule.dst.addr.v.a.addr.v6, int_client, int_clientlen) == NULL)) {
++				*rem_port = ntohs(rule.src.port[0]);
++			if(int_client && (inet_ntop(AF_INET6, &rule.dst.addr.v.a.addr.v6, int_client, int_clientlen) == NULL)) {
+ 				return -1;
+ 			}
+ 			if(int_port)
+-				*int_port = ntohs(pr.rule.dst.port[0]);
++				*int_port = ntohs(rule.dst.port[0]);
+ 			if(proto)
+-				*proto = pr.rule.proto;
++				*proto = rule.proto;
+ 			if(timestamp)
+ 				sscanf(p, "ts-%u", timestamp);
+ 			if(desc) {
+@@ -336,14 +340,14 @@ get_pinhole_info(unsigned short uid,
+ 			}
+ #ifdef PFRULE_INOUT_COUNTS
+ 			if(packets)
+-				*packets = pr.rule.packets[0] + pr.rule.packets[1];
++				*packets = rule.packets[0] + rule.packets[1];
+ 			if(bytes)
+-				*bytes = pr.rule.bytes[0] + pr.rule.bytes[1];
++				*bytes = rule.bytes[0] + rule.bytes[1];
+ #else
+ 			if(packets)
+-				*packets = pr.rule.packets;
++				*packets = rule.packets;
+ 			if(bytes)
+-				*bytes = pr.rule.bytes;
++				*bytes = rule.bytes;
+ #endif
+ 			return 0;
+ 		}
+@@ -369,6 +373,7 @@ int clean_pinhole_list(unsigned int * next_timestamp)
+ {
+ 	int i;
+ 	struct pfioc_rule pr;
++	struct pfctl_rule rule;
+ 	time_t current_time;
+ 	unsigned int ts;
+ 	int uid;
+@@ -392,16 +397,16 @@ int clean_pinhole_list(unsigned int * next_timestamp)
+ 	}
+ 	for(i = pr.nr - 1; i >= 0; i--) {
+ 		pr.nr = i;
+-		if(ioctl(dev, DIOCGETRULE, &pr) < 0) {
++		if (pfctl_get_rule(dev, i, pr.ticket, pr.anchor, pr.action, &rule, pr.anchor_call) < 0) {
+ 			syslog(LOG_ERR, "ioctl(dev, DIOCGETRULE): %m");
+ 			return -1;
+ 		}
+-		if(sscanf(pr.rule.label, PINEHOLE_LABEL_FORMAT_SKIPDESC, &uid, &ts) != 2) {
+-			syslog(LOG_DEBUG, "rule with label '%s' is not a IGD pinhole", pr.rule.label);
++		if(sscanf(rule.label[0], PINEHOLE_LABEL_FORMAT_SKIPDESC, &uid, &ts) != 2) {
++			syslog(LOG_DEBUG, "rule with label '%s' is not a IGD pinhole", rule.label[0]);
+ 			continue;
+ 		}
+ 		if(ts <= (unsigned int)current_time) {
+-			syslog(LOG_INFO, "removing expired pinhole '%s'", pr.rule.label);
++			syslog(LOG_INFO, "removing expired pinhole '%s'", rule.label[0]);
+ 			pr.action = PF_CHANGE_GET_TICKET;
+ 			if(ioctl(dev, DIOCCHANGERULE, &pr) < 0) {
+ 				syslog(LOG_ERR, "ioctl(dev, DIOCCHANGERULE, ...) PF_CHANGE_GET_TICKET: %m");



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202311130939.3AD9do6h076676>