]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - sys/netgraph/netflow/ng_netflow.c
Add a TestFloat based test suite for floating-point implementations
[FreeBSD/FreeBSD.git] / sys / netgraph / netflow / ng_netflow.c
1 /*-
2  * Copyright (c) 2004-2005 Gleb Smirnoff <glebius@FreeBSD.org>
3  * Copyright (c) 2001-2003 Roman V. Palagin <romanp@unshadow.net>
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  *
15  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25  * SUCH DAMAGE.
26  *
27  * $SourceForge: ng_netflow.c,v 1.30 2004/09/05 11:37:43 glebius Exp $
28  */
29
30 static const char rcs_id[] =
31     "@(#) $FreeBSD$";
32
33 #include <sys/param.h>
34 #include <sys/systm.h>
35 #include <sys/kernel.h>
36 #include <sys/limits.h>
37 #include <sys/mbuf.h>
38 #include <sys/socket.h>
39 #include <sys/syslog.h>
40 #include <sys/ctype.h>
41
42 #include <net/if.h>
43 #include <net/ethernet.h>
44 #include <net/if_arp.h>
45 #include <net/if_var.h>
46 #include <net/if_vlan_var.h>
47 #include <net/bpf.h>
48 #include <netinet/in.h>
49 #include <netinet/in_systm.h>
50 #include <netinet/ip.h>
51 #include <netinet/tcp.h>
52 #include <netinet/udp.h>
53
54 #include <netgraph/ng_message.h>
55 #include <netgraph/ng_parse.h>
56 #include <netgraph/netgraph.h>
57 #include <netgraph/netflow/netflow.h>
58 #include <netgraph/netflow/ng_netflow.h>
59
60 /* Netgraph methods */
61 static ng_constructor_t ng_netflow_constructor;
62 static ng_rcvmsg_t      ng_netflow_rcvmsg;
63 static ng_close_t       ng_netflow_close;
64 static ng_shutdown_t    ng_netflow_rmnode;
65 static ng_newhook_t     ng_netflow_newhook;
66 static ng_rcvdata_t     ng_netflow_rcvdata;
67 static ng_disconnect_t  ng_netflow_disconnect;
68
69 /* Parse type for struct ng_netflow_info */
70 static const struct ng_parse_struct_field ng_netflow_info_type_fields[]
71         = NG_NETFLOW_INFO_TYPE;
72 static const struct ng_parse_type ng_netflow_info_type = {
73         &ng_parse_struct_type,
74         &ng_netflow_info_type_fields
75 };
76
77 /*  Parse type for struct ng_netflow_ifinfo */
78 static const struct ng_parse_struct_field ng_netflow_ifinfo_type_fields[]
79         = NG_NETFLOW_IFINFO_TYPE;
80 static const struct ng_parse_type ng_netflow_ifinfo_type = {
81         &ng_parse_struct_type,
82         &ng_netflow_ifinfo_type_fields
83 };
84
85 /* Parse type for struct ng_netflow_setdlt */
86 static const struct ng_parse_struct_field ng_netflow_setdlt_type_fields[]
87         = NG_NETFLOW_SETDLT_TYPE;
88 static const struct ng_parse_type ng_netflow_setdlt_type = {
89         &ng_parse_struct_type,
90         &ng_netflow_setdlt_type_fields
91 };
92
93 /* Parse type for ng_netflow_setifindex */
94 static const struct ng_parse_struct_field ng_netflow_setifindex_type_fields[]
95         = NG_NETFLOW_SETIFINDEX_TYPE;
96 static const struct ng_parse_type ng_netflow_setifindex_type = {
97         &ng_parse_struct_type,
98         &ng_netflow_setifindex_type_fields
99 };
100
101 /* Parse type for ng_netflow_settimeouts */
102 static const struct ng_parse_struct_field ng_netflow_settimeouts_type_fields[]
103         = NG_NETFLOW_SETTIMEOUTS_TYPE;
104 static const struct ng_parse_type ng_netflow_settimeouts_type = {
105         &ng_parse_struct_type,
106         &ng_netflow_settimeouts_type_fields
107 };
108
109 /* Parse type for ng_netflow_setconfig */
110 static const struct ng_parse_struct_field ng_netflow_setconfig_type_fields[]
111         = NG_NETFLOW_SETCONFIG_TYPE;
112 static const struct ng_parse_type ng_netflow_setconfig_type = {
113         &ng_parse_struct_type,
114         &ng_netflow_setconfig_type_fields
115 };
116
117 /* List of commands and how to convert arguments to/from ASCII */
118 static const struct ng_cmdlist ng_netflow_cmds[] = {
119        {
120          NGM_NETFLOW_COOKIE,
121          NGM_NETFLOW_INFO,
122          "info",
123          NULL,
124          &ng_netflow_info_type
125        },
126        {
127         NGM_NETFLOW_COOKIE,
128         NGM_NETFLOW_IFINFO,
129         "ifinfo",
130         &ng_parse_uint16_type,
131         &ng_netflow_ifinfo_type
132        },
133        {
134         NGM_NETFLOW_COOKIE,
135         NGM_NETFLOW_SETDLT,
136         "setdlt",
137         &ng_netflow_setdlt_type,
138         NULL
139        },
140        {
141         NGM_NETFLOW_COOKIE,
142         NGM_NETFLOW_SETIFINDEX,
143         "setifindex",
144         &ng_netflow_setifindex_type,
145         NULL
146        },
147        {
148         NGM_NETFLOW_COOKIE,
149         NGM_NETFLOW_SETTIMEOUTS,
150         "settimeouts",
151         &ng_netflow_settimeouts_type,
152         NULL
153        },
154        {
155         NGM_NETFLOW_COOKIE,
156         NGM_NETFLOW_SETCONFIG,
157         "setconfig",
158         &ng_netflow_setconfig_type,
159         NULL
160        },
161        { 0 }
162 };
163
164
165 /* Netgraph node type descriptor */
166 static struct ng_type ng_netflow_typestruct = {
167         .version =      NG_ABI_VERSION,
168         .name =         NG_NETFLOW_NODE_TYPE,
169         .constructor =  ng_netflow_constructor,
170         .rcvmsg =       ng_netflow_rcvmsg,
171         .close =        ng_netflow_close,
172         .shutdown =     ng_netflow_rmnode,
173         .newhook =      ng_netflow_newhook,
174         .rcvdata =      ng_netflow_rcvdata,
175         .disconnect =   ng_netflow_disconnect,
176         .cmdlist =      ng_netflow_cmds,
177 };
178 NETGRAPH_INIT(netflow, &ng_netflow_typestruct);
179
180 /* Called at node creation */
181 static int
182 ng_netflow_constructor(node_p node)
183 {
184         priv_p priv;
185         int error = 0, i;
186
187         /* Initialize private data */
188         priv = malloc(sizeof(*priv), M_NETGRAPH, M_NOWAIT);
189         if (priv == NULL)
190                 return (ENOMEM);
191         bzero(priv, sizeof(*priv));
192
193         /* Make node and its data point at each other */
194         NG_NODE_SET_PRIVATE(node, priv);
195         priv->node = node;
196
197         /* Initialize timeouts to default values */
198         priv->info.nfinfo_inact_t = INACTIVE_TIMEOUT;
199         priv->info.nfinfo_act_t = ACTIVE_TIMEOUT;
200
201         /* Set default config */
202         for (i = 0; i < NG_NETFLOW_MAXIFACES; i++)
203                 priv->ifaces[i].info.conf = NG_NETFLOW_CONF_INGRESS;
204
205         /* Initialize callout handle */
206         callout_init(&priv->exp_callout, CALLOUT_MPSAFE);
207
208         /* Allocate memory and set up flow cache */
209         if ((error = ng_netflow_cache_init(priv)))
210                 return (error);
211
212         return (0);
213 }
214
215 /*
216  * ng_netflow supports two hooks: data and export.
217  * Incoming traffic is expected on data, and expired
218  * netflow datagrams are sent to export.
219  */
220 static int
221 ng_netflow_newhook(node_p node, hook_p hook, const char *name)
222 {
223         const priv_p priv = NG_NODE_PRIVATE(node);
224
225         if (strncmp(name, NG_NETFLOW_HOOK_DATA, /* an iface hook? */
226             strlen(NG_NETFLOW_HOOK_DATA)) == 0) {
227                 iface_p iface;
228                 int ifnum = -1;
229                 const char *cp;
230                 char *eptr;
231
232                 cp = name + strlen(NG_NETFLOW_HOOK_DATA);
233                 if (!isdigit(*cp) || (cp[0] == '0' && cp[1] != '\0'))
234                         return (EINVAL);
235
236                 ifnum = (int)strtoul(cp, &eptr, 10);
237                 if (*eptr != '\0' || ifnum < 0 || ifnum >= NG_NETFLOW_MAXIFACES)
238                         return (EINVAL);
239
240                 /* See if hook is already connected */
241                 if (priv->ifaces[ifnum].hook != NULL)
242                         return (EISCONN);
243
244                 iface = &priv->ifaces[ifnum];
245
246                 /* Link private info and hook together */
247                 NG_HOOK_SET_PRIVATE(hook, iface);
248                 iface->hook = hook;
249
250                 /*
251                  * In most cases traffic accounting is done on an
252                  * Ethernet interface, so default data link type
253                  * will be DLT_EN10MB.
254                  */
255                 iface->info.ifinfo_dlt = DLT_EN10MB;
256
257         } else if (strncmp(name, NG_NETFLOW_HOOK_OUT,
258             strlen(NG_NETFLOW_HOOK_OUT)) == 0) {
259                 iface_p iface;
260                 int ifnum = -1;
261                 const char *cp;
262                 char *eptr;
263
264                 cp = name + strlen(NG_NETFLOW_HOOK_OUT);
265                 if (!isdigit(*cp) || (cp[0] == '0' && cp[1] != '\0'))
266                         return (EINVAL);
267
268                 ifnum = (int)strtoul(cp, &eptr, 10);
269                 if (*eptr != '\0' || ifnum < 0 || ifnum >= NG_NETFLOW_MAXIFACES)
270                         return (EINVAL);
271
272                 /* See if hook is already connected */
273                 if (priv->ifaces[ifnum].out != NULL)
274                         return (EISCONN);
275
276                 iface = &priv->ifaces[ifnum];
277
278                 /* Link private info and hook together */
279                 NG_HOOK_SET_PRIVATE(hook, iface);
280                 iface->out = hook;
281
282         } else if (strcmp(name, NG_NETFLOW_HOOK_EXPORT) == 0) {
283
284                 if (priv->export != NULL)
285                         return (EISCONN);
286
287                 priv->export = hook;
288
289                 /* Exporter is ready. Let's schedule expiry. */
290                 callout_reset(&priv->exp_callout, (1*hz), &ng_netflow_expire,
291                     (void *)priv);
292         } else
293                 return (EINVAL);
294
295         return (0);
296 }
297
298 /* Get a netgraph control message. */
299 static int
300 ng_netflow_rcvmsg (node_p node, item_p item, hook_p lasthook)
301 {
302         const priv_p priv = NG_NODE_PRIVATE(node);
303         struct ng_mesg *resp = NULL;
304         int error = 0;
305         struct ng_mesg *msg;
306
307         NGI_GET_MSG(item, msg);
308
309         /* Deal with message according to cookie and command */
310         switch (msg->header.typecookie) {
311         case NGM_NETFLOW_COOKIE:
312                 switch (msg->header.cmd) {
313                 case NGM_NETFLOW_INFO:
314                 {
315                         struct ng_netflow_info *i;
316
317                         NG_MKRESPONSE(resp, msg, sizeof(struct ng_netflow_info),
318                             M_NOWAIT);
319                         i = (struct ng_netflow_info *)resp->data;
320                         ng_netflow_copyinfo(priv, i);
321
322                         break;
323                 }
324                 case NGM_NETFLOW_IFINFO:
325                 {
326                         struct ng_netflow_ifinfo *i;
327                         const uint16_t *index;
328
329                         if (msg->header.arglen != sizeof(uint16_t))
330                                  ERROUT(EINVAL);
331
332                         index  = (uint16_t *)msg->data;
333                         if (*index >= NG_NETFLOW_MAXIFACES)
334                                 ERROUT(EINVAL);
335
336                         /* connected iface? */
337                         if (priv->ifaces[*index].hook == NULL)
338                                  ERROUT(EINVAL);
339
340                         NG_MKRESPONSE(resp, msg,
341                              sizeof(struct ng_netflow_ifinfo), M_NOWAIT);
342                         i = (struct ng_netflow_ifinfo *)resp->data;
343                         memcpy((void *)i, (void *)&priv->ifaces[*index].info,
344                             sizeof(priv->ifaces[*index].info));
345
346                         break;
347                 }
348                 case NGM_NETFLOW_SETDLT:
349                 {
350                         struct ng_netflow_setdlt *set;
351                         struct ng_netflow_iface *iface;
352
353                         if (msg->header.arglen != sizeof(struct ng_netflow_setdlt))
354                                 ERROUT(EINVAL);
355
356                         set = (struct ng_netflow_setdlt *)msg->data;
357                         if (set->iface >= NG_NETFLOW_MAXIFACES)
358                                 ERROUT(EINVAL);
359                         iface = &priv->ifaces[set->iface];
360
361                         /* connected iface? */
362                         if (iface->hook == NULL)
363                                 ERROUT(EINVAL);
364
365                         switch (set->dlt) {
366                         case    DLT_EN10MB:
367                                 iface->info.ifinfo_dlt = DLT_EN10MB;
368                                 break;
369                         case    DLT_RAW:
370                                 iface->info.ifinfo_dlt = DLT_RAW;
371                                 break;
372                         default:
373                                 ERROUT(EINVAL);
374                         }
375                         break;
376                 }
377                 case NGM_NETFLOW_SETIFINDEX:
378                 {
379                         struct ng_netflow_setifindex *set;
380                         struct ng_netflow_iface *iface;
381
382                         if (msg->header.arglen != sizeof(struct ng_netflow_setifindex))
383                                 ERROUT(EINVAL);
384
385                         set = (struct ng_netflow_setifindex *)msg->data;
386                         if (set->iface >= NG_NETFLOW_MAXIFACES)
387                                 ERROUT(EINVAL);
388                         iface = &priv->ifaces[set->iface];
389
390                         /* connected iface? */
391                         if (iface->hook == NULL)
392                                 ERROUT(EINVAL);
393
394                         iface->info.ifinfo_index = set->index;
395
396                         break;
397                 }
398                 case NGM_NETFLOW_SETTIMEOUTS:
399                 {
400                         struct ng_netflow_settimeouts *set;
401
402                         if (msg->header.arglen != sizeof(struct ng_netflow_settimeouts))
403                                 ERROUT(EINVAL);
404
405                         set = (struct ng_netflow_settimeouts *)msg->data;
406
407                         priv->info.nfinfo_inact_t = set->inactive_timeout;
408                         priv->info.nfinfo_act_t = set->active_timeout;
409
410                         break;
411                 }
412                 case NGM_NETFLOW_SETCONFIG:
413                 {
414                         struct ng_netflow_setconfig *set;
415
416                         if (msg->header.arglen != sizeof(struct ng_netflow_setconfig))
417                                 ERROUT(EINVAL);
418
419                         set = (struct ng_netflow_setconfig *)msg->data;
420
421                         if (set->iface >= NG_NETFLOW_MAXIFACES)
422                                 ERROUT(EINVAL);
423                         
424                         priv->ifaces[set->iface].info.conf = set->conf;
425         
426                         break;
427                 }
428                 case NGM_NETFLOW_SHOW:
429                 {
430                         uint32_t *last;
431
432                         if (msg->header.arglen != sizeof(uint32_t))
433                                 ERROUT(EINVAL);
434
435                         last = (uint32_t *)msg->data;
436
437                         NG_MKRESPONSE(resp, msg, NGRESP_SIZE, M_NOWAIT);
438
439                         if (!resp)
440                                 ERROUT(ENOMEM);
441
442                         error = ng_netflow_flow_show(priv, *last, resp);
443
444                         break;
445                 }
446                 default:
447                         ERROUT(EINVAL);         /* unknown command */
448                         break;
449                 }
450                 break;
451         default:
452                 ERROUT(EINVAL);         /* incorrect cookie */
453                 break;
454         }
455
456         /*
457          * Take care of synchronous response, if any.
458          * Free memory and return.
459          */
460 done:
461         NG_RESPOND_MSG(error, node, item, resp);
462         NG_FREE_MSG(msg);
463
464         return (error);
465 }
466
467 /* Receive data on hook. */
468 static int
469 ng_netflow_rcvdata (hook_p hook, item_p item)
470 {
471         const node_p node = NG_HOOK_NODE(hook);
472         const priv_p priv = NG_NODE_PRIVATE(node);
473         const iface_p iface = NG_HOOK_PRIVATE(hook);
474         hook_p out;
475         struct mbuf *m = NULL;
476         struct ip *ip;
477         struct m_tag *mtag;
478         int pullup_len = 0;
479         int error = 0, bypass = 0;
480         unsigned int src_if_index;
481
482         if (hook == priv->export) {
483                 /*
484                  * Data arrived on export hook.
485                  * This must not happen.
486                  */
487                 log(LOG_ERR, "ng_netflow: incoming data on export hook!\n");
488                 ERROUT(EINVAL);
489         };
490
491         if (hook == iface->hook) {
492                 if ((iface->info.conf & NG_NETFLOW_CONF_INGRESS) == 0)
493                         bypass = 1;
494                 out = iface->out;
495         } else if (hook == iface->out) {
496                 if ((iface->info.conf & NG_NETFLOW_CONF_EGRESS) == 0)
497                         bypass = 1;
498                 out = iface->hook;
499         } else 
500                 ERROUT(EINVAL);
501         
502         if ((!bypass) &&
503             (iface->info.conf & (NG_NETFLOW_CONF_ONCE | NG_NETFLOW_CONF_THISONCE))) {
504                 mtag = m_tag_locate(NGI_M(item), MTAG_NETFLOW,
505                     MTAG_NETFLOW_CALLED, NULL);
506                 while (mtag != NULL) {
507                         if ((iface->info.conf & NG_NETFLOW_CONF_ONCE) ||
508                             ((ng_ID_t *)(mtag + 1))[0] == NG_NODE_ID(node)) {
509                                 bypass = 1;
510                                 break;
511                         }
512                         mtag = m_tag_locate(NGI_M(item), MTAG_NETFLOW,
513                             MTAG_NETFLOW_CALLED, mtag);
514                 }
515         }
516         
517         if (bypass) {
518                 if (out == NULL)
519                         ERROUT(ENOTCONN);
520
521                 NG_FWD_ITEM_HOOK(error, item, out);
522                 return (error);
523         }
524         
525         if (iface->info.conf & (NG_NETFLOW_CONF_ONCE | NG_NETFLOW_CONF_THISONCE)) {
526                 mtag = m_tag_alloc(MTAG_NETFLOW, MTAG_NETFLOW_CALLED,
527                     sizeof(ng_ID_t), M_NOWAIT);
528                 if (mtag) {
529                         ((ng_ID_t *)(mtag + 1))[0] = NG_NODE_ID(node);
530                         m_tag_prepend(NGI_M(item), mtag);
531                 }
532         }
533
534         NGI_GET_M(item, m);
535
536         /* Increase counters. */
537         iface->info.ifinfo_packets++;
538
539         /*
540          * Depending on interface data link type and packet contents
541          * we pullup enough data, so that ng_netflow_flow_add() does not
542          * need to know about mbuf at all. We keep current length of data
543          * needed to be contiguous in pullup_len. mtod() is done at the
544          * very end one more time, since m can had changed after pulluping.
545          *
546          * In case of unrecognized data we don't return error, but just
547          * pass data to downstream hook, if it is available.
548          */
549
550 #define M_CHECK(length) do {                                    \
551         pullup_len += length;                                   \
552         if ((m)->m_pkthdr.len < (pullup_len)) {                 \
553                 error = EINVAL;                                 \
554                 goto bypass;                                    \
555         }                                                       \
556         if ((m)->m_len < (pullup_len) &&                        \
557            (((m) = m_pullup((m),(pullup_len))) == NULL)) {      \
558                 error = ENOBUFS;                                \
559                 goto done;                                      \
560         }                                                       \
561 } while (0)
562
563         switch (iface->info.ifinfo_dlt) {
564         case DLT_EN10MB:        /* Ethernet */
565             {
566                 struct ether_header *eh;
567                 uint16_t etype;
568
569                 M_CHECK(sizeof(struct ether_header));
570                 eh = mtod(m, struct ether_header *);
571
572                 /* Make sure this is IP frame. */
573                 etype = ntohs(eh->ether_type);
574                 switch (etype) {
575                 case ETHERTYPE_IP:
576                         M_CHECK(sizeof(struct ip));
577                         eh = mtod(m, struct ether_header *);
578                         ip = (struct ip *)(eh + 1);
579                         break;
580                 case ETHERTYPE_VLAN:
581                     {
582                         struct ether_vlan_header *evh;
583
584                         M_CHECK(sizeof(struct ether_vlan_header) -
585                             sizeof(struct ether_header));
586                         evh = mtod(m, struct ether_vlan_header *);
587                         if (ntohs(evh->evl_proto) == ETHERTYPE_IP) {
588                                 M_CHECK(sizeof(struct ip));
589                                 ip = (struct ip *)(evh + 1);
590                                 break;
591                         }
592                     }
593                 default:
594                         goto bypass;    /* pass this frame */
595                 }
596                 break;
597             }
598         case DLT_RAW:           /* IP packets */
599                 M_CHECK(sizeof(struct ip));
600                 ip = mtod(m, struct ip *);
601                 break;
602         default:
603                 goto bypass;
604                 break;
605         }
606
607         if ((ip->ip_off & htons(IP_OFFMASK)) == 0) {
608                 /*
609                  * In case of IP header with options, we haven't pulled
610                  * up enough, yet.
611                  */
612                 pullup_len += (ip->ip_hl << 2) - sizeof(struct ip);
613
614                 switch (ip->ip_p) {
615                 case IPPROTO_TCP:
616                         M_CHECK(sizeof(struct tcphdr));
617                         break;
618                 case IPPROTO_UDP:
619                         M_CHECK(sizeof(struct udphdr));
620                         break;
621                 }
622         }
623
624         switch (iface->info.ifinfo_dlt) {
625         case DLT_EN10MB:
626             {
627                 struct ether_header *eh;
628
629                 eh = mtod(m, struct ether_header *);
630                 switch (ntohs(eh->ether_type)) {
631                 case ETHERTYPE_IP:
632                         ip = (struct ip *)(eh + 1);
633                         break;
634                 case ETHERTYPE_VLAN:
635                     {
636                         struct ether_vlan_header *evh;
637
638                         evh = mtod(m, struct ether_vlan_header *);
639                         ip = (struct ip *)(evh + 1);
640                         break;
641                      }
642                 default:
643                         panic("ng_netflow entered deadcode");
644                 }
645                 break;
646              }
647         case DLT_RAW:
648                 ip = mtod(m, struct ip *);
649                 break;
650         default:
651                 panic("ng_netflow entered deadcode");
652         }
653
654 #undef  M_CHECK
655
656         /* Determine packet input interface. Prefer configured. */
657         src_if_index = 0;
658         if (hook == iface->out || iface->info.ifinfo_index == 0) {
659                 if (m->m_pkthdr.rcvif != NULL)
660                         src_if_index = m->m_pkthdr.rcvif->if_index;
661         } else
662                 src_if_index = iface->info.ifinfo_index;
663
664         error = ng_netflow_flow_add(priv, ip, src_if_index);
665
666 bypass:
667         if (out != NULL) {
668                 /* XXX: error gets overwritten here */
669                 NG_FWD_NEW_DATA(error, item, out, m);
670                 return (error);
671         }
672 done:
673         if (item)
674                 NG_FREE_ITEM(item);
675         if (m)
676                 NG_FREE_M(m);
677
678         return (error); 
679 }
680
681 /* We will be shut down in a moment */
682 static int
683 ng_netflow_close(node_p node)
684 {
685         const priv_p priv = NG_NODE_PRIVATE(node);
686
687         callout_drain(&priv->exp_callout);
688         ng_netflow_cache_flush(priv);
689
690         return (0);
691 }
692
693 /* Do local shutdown processing. */
694 static int
695 ng_netflow_rmnode(node_p node)
696 {
697         const priv_p priv = NG_NODE_PRIVATE(node);
698
699         NG_NODE_SET_PRIVATE(node, NULL);
700         NG_NODE_UNREF(priv->node);
701
702         free(priv, M_NETGRAPH);
703
704         return (0);
705 }
706
707 /* Hook disconnection. */
708 static int
709 ng_netflow_disconnect(hook_p hook)
710 {
711         node_p node = NG_HOOK_NODE(hook);
712         priv_p priv = NG_NODE_PRIVATE(node);
713         iface_p iface = NG_HOOK_PRIVATE(hook);
714
715         if (iface != NULL) {
716                 if (iface->hook == hook)
717                         iface->hook = NULL;
718                 if (iface->out == hook)
719                         iface->out = NULL;
720         }
721
722         /* if export hook disconnected stop running expire(). */
723         if (hook == priv->export) {
724                 callout_drain(&priv->exp_callout);
725                 priv->export = NULL;
726         }
727
728         /* Removal of the last link destroys the node. */
729         if (NG_NODE_NUMHOOKS(node) == 0)
730                 ng_rmnode_self(node);
731
732         return (0);
733 }