1/* 2 * Copyright (C) 2012 by Darren Reed. 3 * 4 * See the IPFILTER.LICENCE file for details on licencing. 5 * 6 * @(#)ip_fil.h 1.35 6/5/96 7 * $FreeBSD$ 8 * Id: ip_fil.h,v 2.170.2.51 2007/10/10 09:48:03 darrenr Exp $ 9 */ 10 11#ifndef __IP_FIL_H__ 12#define __IP_FIL_H__ 13 14#include "netinet/ip_compat.h" 15#include "netinet/ipf_rb.h" 16#if NETBSD_GE_REV(104040000) 17# include <sys/callout.h> 18#endif 19#if defined(BSD) && defined(_KERNEL) 20# if NETBSD_LT_REV(399000000) || defined(__osf__) || FREEBSD_LT_REV(500043) 21# include <sys/select.h> 22# else 23# include <sys/selinfo.h> 24# endif 25#endif 26 27#if !defined(linux) || !defined(_KERNEL) 28# include <netinet/in.h> 29#endif 30 31#ifndef SOLARIS 32# define SOLARIS (defined(sun) && (defined(__svr4__) || defined(__SVR4))) 33#endif 34 35#ifndef __P 36# ifdef __STDC__ 37# define __P(x) x 38# else 39# define __P(x) () 40# endif 41#endif 42 43#if defined(__STDC__) || defined(__GNUC__) || defined(_AIX51) 44# define SIOCADAFR _IOW('r', 60, struct ipfobj) 45# define SIOCRMAFR _IOW('r', 61, struct ipfobj) 46# define SIOCSETFF _IOW('r', 62, u_int) 47# define SIOCGETFF _IOR('r', 63, u_int) 48# define SIOCGETFS _IOWR('r', 64, struct ipfobj) 49# define SIOCIPFFL _IOWR('r', 65, int) 50# define SIOCIPFFB _IOR('r', 66, int) 51# define SIOCADIFR _IOW('r', 67, struct ipfobj) 52# define SIOCRMIFR _IOW('r', 68, struct ipfobj) 53# define SIOCSWAPA _IOR('r', 69, u_int) 54# define SIOCINAFR _IOW('r', 70, struct ipfobj) 55# define SIOCINIFR _IOW('r', 71, struct ipfobj) 56# define SIOCFRENB _IOW('r', 72, u_int) 57# define SIOCFRSYN _IOW('r', 73, u_int) 58# define SIOCFRZST _IOWR('r', 74, struct ipfobj) 59# define SIOCZRLST _IOWR('r', 75, struct ipfobj) 60# define SIOCAUTHW _IOWR('r', 76, struct ipfobj) 61# define SIOCAUTHR _IOWR('r', 77, struct ipfobj) 62# define SIOCSTAT1 _IOWR('r', 78, struct ipfobj) 63# define SIOCSTLCK _IOWR('r', 79, u_int) 64# define SIOCSTPUT _IOWR('r', 80, struct ipfobj) 65# define SIOCSTGET _IOWR('r', 81, struct ipfobj) 66# define SIOCSTGSZ _IOWR('r', 82, struct ipfobj) 67# define SIOCSTAT2 _IOWR('r', 83, struct ipfobj) 68# define SIOCSETLG _IOWR('r', 84, int) 69# define SIOCGETLG _IOWR('r', 85, int) 70# define SIOCFUNCL _IOWR('r', 86, struct ipfunc_resolve) 71# define SIOCIPFGETNEXT _IOWR('r', 87, struct ipfobj) 72# define SIOCIPFGET _IOWR('r', 88, struct ipfobj) 73# define SIOCIPFSET _IOWR('r', 89, struct ipfobj) 74# define SIOCIPFL6 _IOWR('r', 90, int) 75# define SIOCIPFITER _IOWR('r', 91, struct ipfobj) 76# define SIOCGENITER _IOWR('r', 92, struct ipfobj) 77# define SIOCGTABL _IOWR('r', 93, struct ipfobj) 78# define SIOCIPFDELTOK _IOWR('r', 94, int) 79# define SIOCLOOKUPITER _IOWR('r', 95, struct ipfobj) 80# define SIOCGTQTAB _IOWR('r', 96, struct ipfobj) 81# define SIOCMATCHFLUSH _IOWR('r', 97, struct ipfobj) 82# define SIOCIPFINTERROR _IOR('r', 98, int) 83#else 84# define SIOCADAFR _IOW(r, 60, struct ipfobj) 85# define SIOCRMAFR _IOW(r, 61, struct ipfobj) 86# define SIOCSETFF _IOW(r, 62, u_int) 87# define SIOCGETFF _IOR(r, 63, u_int) 88# define SIOCGETFS _IOWR(r, 64, struct ipfobj) 89# define SIOCIPFFL _IOWR(r, 65, int) 90# define SIOCIPFFB _IOR(r, 66, int) 91# define SIOCADIFR _IOW(r, 67, struct ipfobj) 92# define SIOCRMIFR _IOW(r, 68, struct ipfobj) 93# define SIOCSWAPA _IOR(r, 69, u_int) 94# define SIOCINAFR _IOW(r, 70, struct ipfobj) 95# define SIOCINIFR _IOW(r, 71, struct ipfobj) 96# define SIOCFRENB _IOW(r, 72, u_int) 97# define SIOCFRSYN _IOW(r, 73, u_int) 98# define SIOCFRZST _IOWR(r, 74, struct ipfobj) 99# define SIOCZRLST _IOWR(r, 75, struct ipfobj) 100# define SIOCAUTHW _IOWR(r, 76, struct ipfobj) 101# define SIOCAUTHR _IOWR(r, 77, struct ipfobj) 102# define SIOCSTAT1 _IOWR(r, 78, struct ipfobj) 103# define SIOCSTLCK _IOWR(r, 79, u_int) 104# define SIOCSTPUT _IOWR(r, 80, struct ipfobj) 105# define SIOCSTGET _IOWR(r, 81, struct ipfobj) 106# define SIOCSTGSZ _IOWR(r, 82, struct ipfobj) 107# define SIOCSTAT2 _IOWR(r, 83, struct ipfobj) 108# define SIOCSETLG _IOWR(r, 84, int) 109# define SIOCGETLG _IOWR(r, 85, int) 110# define SIOCFUNCL _IOWR(r, 86, struct ipfunc_resolve) 111# define SIOCIPFGETNEXT _IOWR(r, 87, struct ipfobj) 112# define SIOCIPFGET _IOWR(r, 88, struct ipfobj) 113# define SIOCIPFSET _IOWR(r, 89, struct ipfobj) 114# define SIOCIPFL6 _IOWR(r, 90, int) 115# define SIOCIPFITER _IOWR(r, 91, struct ipfobj) 116# define SIOCGENITER _IOWR(r, 92, struct ipfobj) 117# define SIOCGTABL _IOWR(r, 93, struct ipfobj) 118# define SIOCIPFDELTOK _IOWR(r, 94, int) 119# define SIOCLOOKUPITER _IOWR(r, 95, struct ipfobj) 120# define SIOCGTQTAB _IOWR(r, 96, struct ipfobj) 121# define SIOCMATCHFLUSH _IOWR(r, 97, struct ipfobj) 122# define SIOCIPFINTERROR _IOR(r, 98, int) 123#endif 124#define SIOCADDFR SIOCADAFR 125#define SIOCDELFR SIOCRMAFR 126#define SIOCINSFR SIOCINAFR 127#define SIOCATHST SIOCSTAT1 128#define SIOCGFRST SIOCSTAT2 129 130 131struct ipscan; 132struct ifnet; 133struct ipf_main_softc_s; 134 135typedef int (* lookupfunc_t) __P((struct ipf_main_softc_s *, void *, 136 int, void *, u_int)); 137 138/* 139 * i6addr is used as a container for both IPv4 and IPv6 addresses, as well 140 * as other types of objects, depending on its qualifier. 141 */ 142#ifdef USE_INET6 143typedef union i6addr { 144 u_32_t i6[4]; 145 struct in_addr in4; 146 struct in6_addr in6; 147 void *vptr[2]; 148 lookupfunc_t lptr[2]; 149 struct { 150 u_short type; 151 u_short subtype; 152 int name; 153 } i6un; 154} i6addr_t; 155#else 156typedef union i6addr { 157 u_32_t i6[4]; 158 struct in_addr in4; 159 void *vptr[2]; 160 lookupfunc_t lptr[2]; 161 struct { 162 u_short type; 163 u_short subtype; 164 int name; 165 } i6un; 166} i6addr_t; 167#endif 168 169#define in4_addr in4.s_addr 170#define iplookupnum i6[1] 171#define iplookupname i6un.name 172#define iplookuptype i6un.type 173#define iplookupsubtype i6un.subtype 174/* 175 * NOTE: These DO overlap the above on 64bit systems and this IS recognised. 176 */ 177#define iplookupptr vptr[0] 178#define iplookupfunc lptr[1] 179 180#define I60(x) (((u_32_t *)(x))[0]) 181#define I61(x) (((u_32_t *)(x))[1]) 182#define I62(x) (((u_32_t *)(x))[2]) 183#define I63(x) (((u_32_t *)(x))[3]) 184#define HI60(x) ntohl(((u_32_t *)(x))[0]) 185#define HI61(x) ntohl(((u_32_t *)(x))[1]) 186#define HI62(x) ntohl(((u_32_t *)(x))[2]) 187#define HI63(x) ntohl(((u_32_t *)(x))[3]) 188 189#define IP6_EQ(a,b) ((I63(a) == I63(b)) && (I62(a) == I62(b)) && \ 190 (I61(a) == I61(b)) && (I60(a) == I60(b))) 191#define IP6_NEQ(a,b) ((I63(a) != I63(b)) || (I62(a) != I62(b)) || \ 192 (I61(a) != I61(b)) || (I60(a) != I60(b))) 193#define IP6_ISZERO(a) ((I60(a) | I61(a) | I62(a) | I63(a)) == 0) 194#define IP6_NOTZERO(a) ((I60(a) | I61(a) | I62(a) | I63(a)) != 0) 195#define IP6_ISONES(a) ((I63(a) == 0xffffffff) && (I62(a) == 0xffffffff) && \ 196 (I61(a) == 0xffffffff) && (I60(a) == 0xffffffff)) 197#define IP6_GT(a,b) (ntohl(HI60(a)) > ntohl(HI60(b)) || \ 198 (HI60(a) == HI60(b) && \ 199 (ntohl(HI61(a)) > ntohl(HI61(b)) || \ 200 (HI61(a) == HI61(b) && \ 201 (ntohl(HI62(a)) > ntohl(HI62(b)) || \ 202 (HI62(a) == HI62(b) && \ 203 ntohl(HI63(a)) > ntohl(HI63(b)))))))) 204#define IP6_LT(a,b) (ntohl(HI60(a)) < ntohl(HI60(b)) || \ 205 (HI60(a) == HI60(b) && \ 206 (ntohl(HI61(a)) < ntohl(HI61(b)) || \ 207 (HI61(a) == HI61(b) && \ 208 (ntohl(HI62(a)) < ntohl(HI62(b)) || \ 209 (HI62(a) == HI62(b) && \ 210 ntohl(HI63(a)) < ntohl(HI63(b)))))))) 211#define NLADD(n,x) htonl(ntohl(n) + (x)) 212#define IP6_INC(a) \ 213 do { u_32_t *_i6 = (u_32_t *)(a); \ 214 _i6[3] = NLADD(_i6[3], 1); \ 215 if (_i6[3] == 0) { \ 216 _i6[2] = NLADD(_i6[2], 1); \ 217 if (_i6[2] == 0) { \ 218 _i6[1] = NLADD(_i6[1], 1); \ 219 if (_i6[1] == 0) { \ 220 _i6[0] = NLADD(_i6[0], 1); \ 221 } \ 222 } \ 223 } \ 224 } while (0) 225#define IP6_ADD(a,x,d) \ 226 do { i6addr_t *_s = (i6addr_t *)(a); \ 227 i6addr_t *_d = (i6addr_t *)(d); \ 228 _d->i6[0] = NLADD(_s->i6[0], x); \ 229 if (ntohl(_d->i6[0]) < ntohl(_s->i6[0])) { \ 230 _d->i6[1] = NLADD(_d->i6[1], 1); \ 231 if (ntohl(_d->i6[1]) < ntohl(_s->i6[1])) { \ 232 _d->i6[2] = NLADD(_d->i6[2], 1); \ 233 if (ntohl(_d->i6[2]) < ntohl(_s->i6[2])) { \ 234 _d->i6[3] = NLADD(_d->i6[3], 1); \ 235 } \ 236 } \ 237 } \ 238 } while (0) 239#define IP6_AND(a,b,d) do { i6addr_t *_s1 = (i6addr_t *)(a); \ 240 i6addr_t *_s2 = (i6addr_t *)(b); \ 241 i6addr_t *_d = (i6addr_t *)(d); \ 242 _d->i6[0] = _s1->i6[0] & _s2->i6[0]; \ 243 _d->i6[1] = _s1->i6[1] & _s2->i6[1]; \ 244 _d->i6[2] = _s1->i6[2] & _s2->i6[2]; \ 245 _d->i6[3] = _s1->i6[3] & _s2->i6[3]; \ 246 } while (0) 247#define IP6_ANDASSIGN(a,m) \ 248 do { i6addr_t *_d = (i6addr_t *)(a); \ 249 i6addr_t *_m = (i6addr_t *)(m); \ 250 _d->i6[0] &= _m->i6[0]; \ 251 _d->i6[1] &= _m->i6[1]; \ 252 _d->i6[2] &= _m->i6[2]; \ 253 _d->i6[3] &= _m->i6[3]; \ 254 } while (0) 255#define IP6_MASKEQ(a,m,b) \ 256 (((I60(a) & I60(m)) == I60(b)) && \ 257 ((I61(a) & I61(m)) == I61(b)) && \ 258 ((I62(a) & I62(m)) == I62(b)) && \ 259 ((I63(a) & I63(m)) == I63(b))) 260#define IP6_MASKNEQ(a,m,b) \ 261 (((I60(a) & I60(m)) != I60(b)) || \ 262 ((I61(a) & I61(m)) != I61(b)) || \ 263 ((I62(a) & I62(m)) != I62(b)) || \ 264 ((I63(a) & I63(m)) != I63(b))) 265#define IP6_MERGE(a,b,c) \ 266 do { i6addr_t *_d, *_s1, *_s2; \ 267 _d = (i6addr_t *)(a); \ 268 _s1 = (i6addr_t *)(b); \ 269 _s2 = (i6addr_t *)(c); \ 270 _d->i6[0] |= _s1->i6[0] & ~_s2->i6[0]; \ 271 _d->i6[1] |= _s1->i6[1] & ~_s2->i6[1]; \ 272 _d->i6[2] |= _s1->i6[2] & ~_s2->i6[2]; \ 273 _d->i6[3] |= _s1->i6[3] & ~_s2->i6[3]; \ 274 } while (0) 275#define IP6_MASK(a,b,c) \ 276 do { i6addr_t *_d, *_s1, *_s2; \ 277 _d = (i6addr_t *)(a); \ 278 _s1 = (i6addr_t *)(b); \ 279 _s2 = (i6addr_t *)(c); \ 280 _d->i6[0] = _s1->i6[0] & ~_s2->i6[0]; \ 281 _d->i6[1] = _s1->i6[1] & ~_s2->i6[1]; \ 282 _d->i6[2] = _s1->i6[2] & ~_s2->i6[2]; \ 283 _d->i6[3] = _s1->i6[3] & ~_s2->i6[3]; \ 284 } while (0) 285#define IP6_SETONES(a) \ 286 do { i6addr_t *_d = (i6addr_t *)(a); \ 287 _d->i6[0] = 0xffffffff; \ 288 _d->i6[1] = 0xffffffff; \ 289 _d->i6[2] = 0xffffffff; \ 290 _d->i6[3] = 0xffffffff; \ 291 } while (0) 292 293typedef union ipso_u { 294 u_short ipso_ripso[2]; 295 u_32_t ipso_doi; 296} ipso_t; 297 298typedef struct fr_ip { 299 u_32_t fi_v:4; /* IP version */ 300 u_32_t fi_xx:4; /* spare */ 301 u_32_t fi_tos:8; /* IP packet TOS */ 302 u_32_t fi_ttl:8; /* IP packet TTL */ 303 u_32_t fi_p:8; /* IP packet protocol */ 304 u_32_t fi_optmsk; /* bitmask composed from IP options */ 305 i6addr_t fi_src; /* source address from packet */ 306 i6addr_t fi_dst; /* destination address from packet */ 307 ipso_t fi_ipso; /* IP security options */ 308 u_32_t fi_flx; /* packet flags */ 309 u_32_t fi_tcpmsk; /* TCP options set/reset */ 310 u_32_t fi_ports[2]; /* TCP ports */ 311 u_char fi_tcpf; /* TCP flags */ 312 u_char fi_sensitivity; 313 u_char fi_xxx[2]; /* pad */ 314} fr_ip_t; 315 316/* 317 * For use in fi_flx 318 */ 319#define FI_TCPUDP 0x0001 /* TCP/UCP implied comparison*/ 320#define FI_OPTIONS 0x0002 321#define FI_FRAG 0x0004 322#define FI_SHORT 0x0008 323#define FI_NATED 0x0010 324#define FI_MULTICAST 0x0020 325#define FI_BROADCAST 0x0040 326#define FI_MBCAST 0x0080 327#define FI_STATE 0x0100 328#define FI_BADNAT 0x0200 329#define FI_BAD 0x0400 330#define FI_OOW 0x0800 /* Out of state window, else match */ 331#define FI_ICMPERR 0x1000 332#define FI_FRAGBODY 0x2000 333#define FI_BADSRC 0x4000 334#define FI_LOWTTL 0x8000 335#define FI_CMP 0x5cfe3 /* Not FI_FRAG,FI_NATED,FI_FRAGTAIL */ 336#define FI_ICMPCMP 0x0003 /* Flags we can check for ICMP error packets */ 337#define FI_WITH 0x5effe /* Not FI_TCPUDP */ 338#define FI_V6EXTHDR 0x10000 339#define FI_COALESCE 0x20000 340#define FI_NEWNAT 0x40000 341#define FI_ICMPQUERY 0x80000 342#define FI_ENCAP 0x100000 /* encap/decap with NAT */ 343#define FI_AH 0x200000 /* AH header present */ 344#define FI_DOCKSUM 0x10000000 /* Proxy wants L4 recalculation */ 345#define FI_NOCKSUM 0x20000000 /* don't do a L4 checksum validation */ 346#define FI_NOWILD 0x40000000 /* Do not do wildcard searches */ 347#define FI_IGNORE 0x80000000 348 349#define fi_secmsk fi_ipso.ipso_ripso[0] 350#define fi_auth fi_ipso.ipso_ripso[1] 351#define fi_doi fi_ipso.ipso_doi 352#define fi_saddr fi_src.in4.s_addr 353#define fi_daddr fi_dst.in4.s_addr 354#define fi_srcnum fi_src.iplookupnum 355#define fi_dstnum fi_dst.iplookupnum 356#define fi_srcname fi_src.iplookupname 357#define fi_dstname fi_dst.iplookupname 358#define fi_srctype fi_src.iplookuptype 359#define fi_dsttype fi_dst.iplookuptype 360#define fi_srcsubtype fi_src.iplookupsubtype 361#define fi_dstsubtype fi_dst.iplookupsubtype 362#define fi_srcptr fi_src.iplookupptr 363#define fi_dstptr fi_dst.iplookupptr 364#define fi_srcfunc fi_src.iplookupfunc 365#define fi_dstfunc fi_dst.iplookupfunc 366 367 368/* 369 * These are both used by the state and NAT code to indicate that one port or 370 * the other should be treated as a wildcard. 371 * NOTE: When updating, check bit masks in ip_state.h and update there too. 372 */ 373#define SI_W_SPORT 0x00000100 374#define SI_W_DPORT 0x00000200 375#define SI_WILDP (SI_W_SPORT|SI_W_DPORT) 376#define SI_W_SADDR 0x00000400 377#define SI_W_DADDR 0x00000800 378#define SI_WILDA (SI_W_SADDR|SI_W_DADDR) 379#define SI_NEWFR 0x00001000 380#define SI_CLONE 0x00002000 381#define SI_CLONED 0x00004000 382#define SI_NEWCLONE 0x00008000 383 384typedef struct { 385 u_short fda_ports[2]; 386 u_char fda_tcpf; /* TCP header flags (SYN, ACK, etc) */ 387} frdat_t; 388 389typedef enum fr_breasons_e { 390 FRB_BLOCKED = 0, 391 FRB_LOGFAIL = 1, 392 FRB_PPSRATE = 2, 393 FRB_JUMBO = 3, 394 FRB_MAKEFRIP = 4, 395 FRB_STATEADD = 5, 396 FRB_UPDATEIPID = 6, 397 FRB_LOGFAIL2 = 7, 398 FRB_DECAPFRIP = 8, 399 FRB_AUTHNEW = 9, 400 FRB_AUTHCAPTURE = 10, 401 FRB_COALESCE = 11, 402 FRB_PULLUP = 12, 403 FRB_AUTHFEEDBACK = 13, 404 FRB_BADFRAG = 14, 405 FRB_NATV4 = 15, 406 FRB_NATV6 = 16, 407} fr_breason_t; 408 409#define FRB_MAX_VALUE 16 410 411typedef enum ipf_cksum_e { 412 FI_CK_BAD = -1, 413 FI_CK_NEEDED = 0, 414 FI_CK_SUMOK = 1, 415 FI_CK_L4PART = 2, 416 FI_CK_L4FULL = 4 417} ipf_cksum_t; 418 419typedef struct fr_info { 420 void *fin_main_soft; 421 void *fin_ifp; /* interface packet is `on' */ 422 struct frentry *fin_fr; /* last matching rule */ 423 int fin_out; /* in or out ? 1 == out, 0 == in */ 424 fr_ip_t fin_fi; /* IP Packet summary */ 425 frdat_t fin_dat; /* TCP/UDP ports, ICMP code/type */ 426 int fin_dlen; /* length of data portion of packet */ 427 int fin_plen; 428 u_32_t fin_rule; /* rule # last matched */ 429 u_short fin_hlen; /* length of IP header in bytes */ 430 char fin_group[FR_GROUPLEN]; /* group number, -1 for none */ 431 void *fin_dp; /* start of data past IP header */ 432 /* 433 * Fields after fin_dp aren't used for compression of log records. 434 * fin_fi contains the IP version (fin_family) 435 * fin_rule isn't included because adding a new rule can change it but 436 * not change fin_fr. fin_rule is the rule number reported. 437 * It isn't necessary to include fin_crc because that is checked 438 * for explicitly, before calling bcmp. 439 */ 440 u_32_t fin_crc; /* Simple calculation for logging */ 441 int fin_family; /* AF_INET, etc. */ 442 int fin_icode; /* ICMP error to return */ 443 int fin_mtu; /* MTU input for ICMP need-frag */ 444 int fin_rev; /* state only: 1 = reverse */ 445 int fin_ipoff; /* # bytes from buffer start to hdr */ 446 u_32_t fin_id; /* IP packet id field */ 447 u_short fin_l4hlen; /* length of L4 header, if known */ 448 u_short fin_off; 449 int fin_depth; /* Group nesting depth */ 450 int fin_error; /* Error code to return */ 451 ipf_cksum_t fin_cksum; /* -1 = bad, 1 = good, 0 = not done */ 452 fr_breason_t fin_reason; /* why auto blocked */ 453 u_int fin_pktnum; 454 void *fin_nattag; 455 struct frdest *fin_dif; 456 struct frdest *fin_tif; 457 union { 458 ip_t *fip_ip; 459#ifdef USE_INET6 460 ip6_t *fip_ip6; 461#endif 462 } fin_ipu; 463 mb_t **fin_mp; /* pointer to pointer to mbuf */ 464 mb_t *fin_m; /* pointer to mbuf */ 465#ifdef MENTAT 466 mb_t *fin_qfm; /* pointer to mblk where pkt starts */ 467 void *fin_qpi; 468 char fin_ifname[LIFNAMSIZ]; 469#endif 470#ifdef __sgi 471 void *fin_hbuf; 472#endif 473 void *fin_fraghdr; /* pointer to start of ipv6 frag hdr */ 474} fr_info_t; 475 476#define fin_ip fin_ipu.fip_ip 477#define fin_ip6 fin_ipu.fip_ip6 478#define fin_v fin_fi.fi_v 479#define fin_p fin_fi.fi_p 480#define fin_flx fin_fi.fi_flx 481#define fin_optmsk fin_fi.fi_optmsk 482#define fin_secmsk fin_fi.fi_secmsk 483#define fin_doi fin_fi.fi_doi 484#define fin_auth fin_fi.fi_auth 485#define fin_src fin_fi.fi_src.in4 486#define fin_saddr fin_fi.fi_saddr 487#define fin_dst fin_fi.fi_dst.in4 488#define fin_daddr fin_fi.fi_daddr 489#define fin_data fin_fi.fi_ports 490#define fin_sport fin_fi.fi_ports[0] 491#define fin_dport fin_fi.fi_ports[1] 492#define fin_tcpf fin_fi.fi_tcpf 493#define fin_src6 fin_fi.fi_src 494#define fin_dst6 fin_fi.fi_dst 495#define fin_srcip6 fin_fi.fi_src.in6 496#define fin_dstip6 fin_fi.fi_dst.in6 497 498#define IPF_IN 0 499#define IPF_OUT 1 500 501typedef struct frentry *(*ipfunc_t) __P((fr_info_t *, u_32_t *)); 502typedef int (*ipfuncinit_t) __P((struct ipf_main_softc_s *, struct frentry *)); 503 504typedef struct ipfunc_resolve { 505 char ipfu_name[32]; 506 ipfunc_t ipfu_addr; 507 ipfuncinit_t ipfu_init; 508 ipfuncinit_t ipfu_fini; 509} ipfunc_resolve_t; 510 511/* 512 * Size for compares on fr_info structures 513 */ 514#define FI_CSIZE offsetof(fr_info_t, fin_icode) 515#define FI_LCSIZE offsetof(fr_info_t, fin_dp) 516 517/* 518 * Size for copying cache fr_info structure 519 */ 520#define FI_COPYSIZE offsetof(fr_info_t, fin_dp) 521 522/* 523 * Structure for holding IPFilter's tag information 524 */ 525#define IPFTAG_LEN 16 526typedef struct { 527 union { 528 u_32_t iptu_num[4]; 529 char iptu_tag[IPFTAG_LEN]; 530 } ipt_un; 531 int ipt_not; 532} ipftag_t; 533 534#define ipt_tag ipt_un.iptu_tag 535#define ipt_num ipt_un.iptu_num 536 537/* 538 * Structure to define address for pool lookups. 539 */ 540typedef struct { 541 u_char adf_len; 542 sa_family_t adf_family; 543 u_char adf_xxx[2]; 544 i6addr_t adf_addr; 545} addrfamily_t; 546 547 548RBI_LINK(ipf_rb, host_node_s); 549 550typedef struct host_node_s { 551 RBI_FIELD(ipf_rb) hn_entry; 552 addrfamily_t hn_addr; 553 int hn_active; 554} host_node_t; 555 556typedef RBI_HEAD(ipf_rb, host_node_s) ipf_rb_head_t; 557 558typedef struct host_track_s { 559 ipf_rb_head_t ht_root; 560 int ht_max_nodes; 561 int ht_max_per_node; 562 int ht_netmask; 563 int ht_cur_nodes; 564} host_track_t; 565 566 567typedef enum fr_dtypes_e { 568 FRD_NORMAL = 0, 569 FRD_DSTLIST 570} fr_dtypes_t; 571/* 572 * This structure is used to hold information about the next hop for where 573 * to forward a packet. 574 */ 575typedef struct frdest { 576 void *fd_ptr; 577 addrfamily_t fd_addr; 578 fr_dtypes_t fd_type; 579 int fd_name; 580 int fd_local; 581} frdest_t; 582 583#define fd_ip6 fd_addr.adf_addr 584#define fd_ip fd_ip6.in4 585 586 587typedef enum fr_ctypes_e { 588 FR_NONE = 0, 589 FR_EQUAL, 590 FR_NEQUAL, 591 FR_LESST, 592 FR_GREATERT, 593 FR_LESSTE, 594 FR_GREATERTE, 595 FR_OUTRANGE, 596 FR_INRANGE, 597 FR_INCRANGE 598} fr_ctypes_t; 599 600/* 601 * This structure holds information about a port comparison. 602 */ 603typedef struct frpcmp { 604 fr_ctypes_t frp_cmp; /* data for port comparisons */ 605 u_32_t frp_port; /* top port for <> and >< */ 606 u_32_t frp_top; /* top port for <> and >< */ 607} frpcmp_t; 608 609 610/* 611 * Structure containing all the relevant TCP things that can be checked in 612 * a filter rule. 613 */ 614typedef struct frtuc { 615 u_char ftu_tcpfm; /* tcp flags mask */ 616 u_char ftu_tcpf; /* tcp flags */ 617 frpcmp_t ftu_src; 618 frpcmp_t ftu_dst; 619} frtuc_t; 620 621#define ftu_scmp ftu_src.frp_cmp 622#define ftu_dcmp ftu_dst.frp_cmp 623#define ftu_sport ftu_src.frp_port 624#define ftu_dport ftu_dst.frp_port 625#define ftu_stop ftu_src.frp_top 626#define ftu_dtop ftu_dst.frp_top 627 628#define FR_TCPFMAX 0x3f 629 630typedef enum fr_atypes_e { 631 FRI_NONE = -1, /* For LHS of NAT */ 632 FRI_NORMAL = 0, /* Normal address */ 633 FRI_DYNAMIC, /* dynamic address */ 634 FRI_LOOKUP, /* address is a pool # */ 635 FRI_RANGE, /* address/mask is a range */ 636 FRI_NETWORK, /* network address from if */ 637 FRI_BROADCAST, /* broadcast address from if */ 638 FRI_PEERADDR, /* Peer address for P-to-P */ 639 FRI_NETMASKED, /* network address with netmask from if */ 640 FRI_SPLIT, /* For NAT compatibility */ 641 FRI_INTERFACE /* address is based on interface name */ 642} fr_atypes_t; 643 644/* 645 * This structure makes up what is considered to be the IPFilter specific 646 * matching components of a filter rule, as opposed to the data structures 647 * used to define the result which are in frentry_t and not here. 648 */ 649typedef struct fripf { 650 fr_ip_t fri_ip; 651 fr_ip_t fri_mip; /* mask structure */ 652 653 u_short fri_icmpm; /* data for ICMP packets (mask) */ 654 u_short fri_icmp; 655 656 frtuc_t fri_tuc; 657 fr_atypes_t fri_satype; /* addres type */ 658 fr_atypes_t fri_datype; /* addres type */ 659 int fri_sifpidx; /* doing dynamic addressing */ 660 int fri_difpidx; /* index into fr_ifps[] to use when */ 661} fripf_t; 662 663#define fri_dlookup fri_mip.fi_dst 664#define fri_slookup fri_mip.fi_src 665#define fri_dstnum fri_mip.fi_dstnum 666#define fri_srcnum fri_mip.fi_srcnum 667#define fri_dstname fri_mip.fi_dstname 668#define fri_srcname fri_mip.fi_srcname 669#define fri_dstptr fri_mip.fi_dstptr 670#define fri_srcptr fri_mip.fi_srcptr 671 672 673typedef enum fr_rtypes_e { 674 FR_T_NONE = 0, 675 FR_T_IPF, /* IPF structures */ 676 FR_T_BPFOPC, /* BPF opcode */ 677 FR_T_CALLFUNC, /* callout to function in fr_func only */ 678 FR_T_COMPIPF, /* compiled C code */ 679 FR_T_IPFEXPR, /* IPF expression */ 680 FR_T_BUILTIN = 0x40000000, /* rule is in kernel space */ 681 FR_T_IPF_BUILTIN, 682 FR_T_BPFOPC_BUILTIN, 683 FR_T_CALLFUNC_BUILTIN, 684 FR_T_COMPIPF_BUILTIN, 685 FR_T_IPFEXPR_BUILTIN 686} fr_rtypes_t; 687 688typedef struct frentry * (* frentfunc_t) __P((fr_info_t *)); 689 690typedef struct frentry { 691 ipfmutex_t fr_lock; 692 struct frentry *fr_next; 693 struct frentry **fr_pnext; 694 struct frgroup *fr_grp; 695 struct frgroup *fr_grphead; 696 struct frgroup *fr_icmpgrp; 697 struct ipscan *fr_isc; 698 struct frentry *fr_dnext; /* 2 fr_die linked list pointers */ 699 struct frentry **fr_pdnext; 700 void *fr_ifas[4]; 701 void *fr_ptr; /* for use with fr_arg */ 702 int fr_comment; /* text comment for rule */ 703 int fr_size; /* size of this structure */ 704 int fr_ref; /* reference count */ 705 int fr_statecnt; /* state count - for limit rules */ 706 u_32_t fr_die; /* only used on loading the rule */ 707 u_int fr_cksum; /* checksum on filter rules for performance */ 708 /* 709 * The line number from a file is here because we need to be able to 710 * match the rule generated with ``grep rule ipf.conf | ipf -rf -'' 711 * with the rule loaded using ``ipf -f ipf.conf'' - thus it can't be 712 * on the other side of fr_func. 713 */ 714 int fr_flineno; /* line number from conf file */ 715 /* 716 * These are only incremented when a packet matches this rule and 717 * it is the last match 718 */ 719 U_QUAD_T fr_hits; 720 U_QUAD_T fr_bytes; 721 722 /* 723 * For PPS rate limiting 724 * fr_lpu is used to always have the same size for this field, 725 * allocating 64bits for seconds and 32bits for milliseconds. 726 */ 727 union { 728 struct timeval frp_lastpkt; 729 char frp_bytes[12]; 730 } fr_lpu; 731 int fr_curpps; 732 733 union { 734 void *fru_data; 735 char *fru_caddr; 736 fripf_t *fru_ipf; 737 frentfunc_t fru_func; 738 } fr_dun; 739 740 /* 741 * Fields after this may not change whilst in the kernel. 742 */ 743 ipfunc_t fr_func; /* call this function */ 744 int fr_dsize; 745 int fr_pps; 746 fr_rtypes_t fr_type; 747 u_32_t fr_flags; /* per-rule flags && options (see below) */ 748 u_32_t fr_logtag; /* user defined log tag # */ 749 u_32_t fr_collect; /* collection number */ 750 u_int fr_arg; /* misc. numeric arg for rule */ 751 u_int fr_loglevel; /* syslog log facility + priority */ 752 u_char fr_family; 753 u_char fr_icode; /* return ICMP code */ 754 int fr_group; /* group to which this rule belongs */ 755 int fr_grhead; /* group # which this rule starts */ 756 int fr_ifnames[4]; 757 int fr_isctag; 758 int fr_rpc; /* XID Filtering */ 759 ipftag_t fr_nattag; 760 frdest_t fr_tifs[2]; /* "to"/"reply-to" interface */ 761 frdest_t fr_dif; /* duplicate packet interface */ 762 /* 763 * These are all options related to stateful filtering 764 */ 765 host_track_t fr_srctrack; 766 int fr_nostatelog; 767 int fr_statemax; /* max reference count */ 768 int fr_icmphead; /* ICMP group for state options */ 769 u_int fr_age[2]; /* non-TCP state timeouts */ 770 /* 771 * How big is the name buffer at the end? 772 */ 773 int fr_namelen; 774 char fr_names[1]; 775} frentry_t; 776 777#define fr_lastpkt fr_lpu.frp_lastpkt 778#define fr_caddr fr_dun.fru_caddr 779#define fr_data fr_dun.fru_data 780#define fr_dfunc fr_dun.fru_func 781#define fr_ipf fr_dun.fru_ipf 782#define fr_ip fr_ipf->fri_ip 783#define fr_mip fr_ipf->fri_mip 784#define fr_icmpm fr_ipf->fri_icmpm 785#define fr_icmp fr_ipf->fri_icmp 786#define fr_tuc fr_ipf->fri_tuc 787#define fr_satype fr_ipf->fri_satype 788#define fr_datype fr_ipf->fri_datype 789#define fr_sifpidx fr_ipf->fri_sifpidx 790#define fr_difpidx fr_ipf->fri_difpidx 791#define fr_proto fr_ip.fi_p 792#define fr_mproto fr_mip.fi_p 793#define fr_ttl fr_ip.fi_ttl 794#define fr_mttl fr_mip.fi_ttl 795#define fr_tos fr_ip.fi_tos 796#define fr_mtos fr_mip.fi_tos 797#define fr_tcpfm fr_tuc.ftu_tcpfm 798#define fr_tcpf fr_tuc.ftu_tcpf 799#define fr_scmp fr_tuc.ftu_scmp 800#define fr_dcmp fr_tuc.ftu_dcmp 801#define fr_dport fr_tuc.ftu_dport 802#define fr_sport fr_tuc.ftu_sport 803#define fr_stop fr_tuc.ftu_stop 804#define fr_dtop fr_tuc.ftu_dtop 805#define fr_dst fr_ip.fi_dst.in4 806#define fr_dst6 fr_ip.fi_dst 807#define fr_daddr fr_ip.fi_dst.in4.s_addr 808#define fr_src fr_ip.fi_src.in4 809#define fr_src6 fr_ip.fi_src 810#define fr_saddr fr_ip.fi_src.in4.s_addr 811#define fr_dmsk fr_mip.fi_dst.in4 812#define fr_dmsk6 fr_mip.fi_dst 813#define fr_dmask fr_mip.fi_dst.in4.s_addr 814#define fr_smsk fr_mip.fi_src.in4 815#define fr_smsk6 fr_mip.fi_src 816#define fr_smask fr_mip.fi_src.in4.s_addr 817#define fr_dstnum fr_ip.fi_dstnum 818#define fr_srcnum fr_ip.fi_srcnum 819#define fr_dlookup fr_ip.fi_dst 820#define fr_slookup fr_ip.fi_src 821#define fr_dstname fr_ip.fi_dstname 822#define fr_srcname fr_ip.fi_srcname 823#define fr_dsttype fr_ip.fi_dsttype 824#define fr_srctype fr_ip.fi_srctype 825#define fr_dstsubtype fr_ip.fi_dstsubtype 826#define fr_srcsubtype fr_ip.fi_srcsubtype 827#define fr_dstptr fr_mip.fi_dstptr 828#define fr_srcptr fr_mip.fi_srcptr 829#define fr_dstfunc fr_mip.fi_dstfunc 830#define fr_srcfunc fr_mip.fi_srcfunc 831#define fr_optbits fr_ip.fi_optmsk 832#define fr_optmask fr_mip.fi_optmsk 833#define fr_secbits fr_ip.fi_secmsk 834#define fr_secmask fr_mip.fi_secmsk 835#define fr_authbits fr_ip.fi_auth 836#define fr_authmask fr_mip.fi_auth 837#define fr_doi fr_ip.fi_doi 838#define fr_doimask fr_mip.fi_doi 839#define fr_flx fr_ip.fi_flx 840#define fr_mflx fr_mip.fi_flx 841#define fr_ifa fr_ifas[0] 842#define fr_oifa fr_ifas[2] 843#define fr_tif fr_tifs[0] 844#define fr_rif fr_tifs[1] 845 846#define FR_NOLOGTAG 0 847 848#define FR_CMPSIZ (sizeof(struct frentry) - \ 849 offsetof(struct frentry, fr_func)) 850#define FR_NAME(_f, _n) (_f)->fr_names + (_f)->_n 851 852 853/* 854 * fr_flags 855 */ 856#define FR_BLOCK 0x00001 /* do not allow packet to pass */ 857#define FR_PASS 0x00002 /* allow packet to pass */ 858#define FR_AUTH 0x00003 /* use authentication */ 859#define FR_PREAUTH 0x00004 /* require preauthentication */ 860#define FR_ACCOUNT 0x00005 /* Accounting rule */ 861#define FR_SKIP 0x00006 /* skip rule */ 862#define FR_DECAPSULATE 0x00008 /* decapsulate rule */ 863#define FR_CALL 0x00009 /* call rule */ 864#define FR_CMDMASK 0x0000f 865#define FR_LOG 0x00010 /* Log */ 866#define FR_LOGB 0x00011 /* Log-fail */ 867#define FR_LOGP 0x00012 /* Log-pass */ 868#define FR_LOGMASK (FR_LOG|FR_CMDMASK) 869#define FR_CALLNOW 0x00020 /* call another function (fr_func) if matches */ 870#define FR_NOTSRCIP 0x00040 871#define FR_NOTDSTIP 0x00080 872#define FR_QUICK 0x00100 /* match & stop processing list */ 873#define FR_KEEPFRAG 0x00200 /* keep fragment information */ 874#define FR_KEEPSTATE 0x00400 /* keep `connection' state information */ 875#define FR_FASTROUTE 0x00800 /* bypass normal routing */ 876#define FR_RETRST 0x01000 /* Return TCP RST packet - reset connection */ 877#define FR_RETICMP 0x02000 /* Return ICMP unreachable packet */ 878#define FR_FAKEICMP 0x03000 /* Return ICMP unreachable with fake source */ 879#define FR_OUTQUE 0x04000 /* outgoing packets */ 880#define FR_INQUE 0x08000 /* ingoing packets */ 881#define FR_LOGBODY 0x10000 /* Log the body */ 882#define FR_LOGFIRST 0x20000 /* Log the first byte if state held */ 883#define FR_LOGORBLOCK 0x40000 /* block the packet if it can't be logged */ 884#define FR_STLOOSE 0x80000 /* loose state checking */ 885#define FR_FRSTRICT 0x100000 /* strict frag. cache */ 886#define FR_STSTRICT 0x200000 /* strict keep state */ 887#define FR_NEWISN 0x400000 /* new ISN for outgoing TCP */ 888#define FR_NOICMPERR 0x800000 /* do not match ICMP errors in state */ 889#define FR_STATESYNC 0x1000000 /* synchronize state to slave */ 890#define FR_COPIED 0x2000000 /* copied from user space */ 891#define FR_INACTIVE 0x4000000 /* only used when flush'ing rules */ 892#define FR_NOMATCH 0x8000000 /* no match occured */ 893 /* 0x10000000 FF_LOGPASS */ 894 /* 0x20000000 FF_LOGBLOCK */ 895 /* 0x40000000 FF_LOGNOMATCH */ 896 /* 0x80000000 FF_BLOCKNONIP */ 897 898#define FR_RETMASK (FR_RETICMP|FR_RETRST|FR_FAKEICMP) 899#define FR_ISBLOCK(x) (((x) & FR_CMDMASK) == FR_BLOCK) 900#define FR_ISPASS(x) (((x) & FR_CMDMASK) == FR_PASS) 901#define FR_ISAUTH(x) (((x) & FR_CMDMASK) == FR_AUTH) 902#define FR_ISPREAUTH(x) (((x) & FR_CMDMASK) == FR_PREAUTH) 903#define FR_ISACCOUNT(x) (((x) & FR_CMDMASK) == FR_ACCOUNT) 904#define FR_ISSKIP(x) (((x) & FR_CMDMASK) == FR_SKIP) 905#define FR_ISDECAPS(x) (((x) & FR_CMDMASK) == FR_DECAPSULATE) 906#define FR_ISNOMATCH(x) ((x) & FR_NOMATCH) 907#define FR_INOUT (FR_INQUE|FR_OUTQUE) 908 909/* 910 * recognized flags for SIOCGETFF and SIOCSETFF, and get put in fr_flags 911 */ 912#define FF_LOGPASS 0x10000000 913#define FF_LOGBLOCK 0x20000000 914#define FF_LOGNOMATCH 0x40000000 915#define FF_LOGGING (FF_LOGPASS|FF_LOGBLOCK|FF_LOGNOMATCH) 916#define FF_BLOCKNONIP 0x80000000 /* Solaris2 Only */ 917 918 919/* 920 * Structure that passes information on what/how to flush to the kernel. 921 */ 922typedef struct ipfflush { 923 int ipflu_how; 924 int ipflu_arg; 925} ipfflush_t; 926 927 928/* 929 * 930 */ 931typedef struct ipfgetctl { 932 u_int ipfg_min; /* min value */ 933 u_int ipfg_current; /* current value */ 934 u_int ipfg_max; /* max value */ 935 u_int ipfg_default; /* default value */ 936 u_int ipfg_steps; /* value increments */ 937 char ipfg_name[40]; /* tag name for this control */ 938} ipfgetctl_t; 939 940typedef struct ipfsetctl { 941 int ipfs_which; /* 0 = min 1 = current 2 = max 3 = default */ 942 u_int ipfs_value; /* min value */ 943 char ipfs_name[40]; /* tag name for this control */ 944} ipfsetctl_t; 945 946 947/* 948 * Some of the statistics below are in their own counters, but most are kept 949 * in this single structure so that they can all easily be collected and 950 * copied back as required. 951 */ 952typedef struct ipf_statistics { 953 u_long fr_icmp_coalesce; 954 u_long fr_tcp_frag; 955 u_long fr_tcp_pullup; 956 u_long fr_tcp_short; 957 u_long fr_tcp_small; 958 u_long fr_tcp_bad_flags; 959 u_long fr_udp_pullup; 960 u_long fr_ip_freed; 961 u_long fr_v6_ah_bad; 962 u_long fr_v6_bad; 963 u_long fr_v6_badfrag; 964 u_long fr_v6_dst_bad; 965 u_long fr_v6_esp_pullup; 966 u_long fr_v6_ext_short; 967 u_long fr_v6_ext_pullup; 968 u_long fr_v6_ext_hlen; 969 u_long fr_v6_frag_bad; 970 u_long fr_v6_frag_pullup; 971 u_long fr_v6_frag_size; 972 u_long fr_v6_gre_pullup; 973 u_long fr_v6_icmp6_pullup; 974 u_long fr_v6_rh_bad; 975 u_long fr_v6_badttl; /* TTL in packet doesn't reach minimum */ 976 u_long fr_v4_ah_bad; 977 u_long fr_v4_ah_pullup; 978 u_long fr_v4_esp_pullup; 979 u_long fr_v4_cipso_bad; 980 u_long fr_v4_cipso_tlen; 981 u_long fr_v4_gre_frag; 982 u_long fr_v4_gre_pullup; 983 u_long fr_v4_icmp_frag; 984 u_long fr_v4_icmp_pullup; 985 u_long fr_v4_badttl; /* TTL in packet doesn't reach minimum */ 986 u_long fr_v4_badsrc; /* source received doesn't match route */ 987 u_long fr_l4_badcksum; /* layer 4 header checksum failure */ 988 u_long fr_badcoalesces; 989 u_long fr_pass; /* packets allowed */ 990 u_long fr_block; /* packets denied */ 991 u_long fr_nom; /* packets which don't match any rule */ 992 u_long fr_short; /* packets which are short */ 993 u_long fr_ppkl; /* packets allowed and logged */ 994 u_long fr_bpkl; /* packets denied and logged */ 995 u_long fr_npkl; /* packets unmatched and logged */ 996 u_long fr_ret; /* packets for which a return is sent */ 997 u_long fr_acct; /* packets for which counting was performed */ 998 u_long fr_bnfr; /* bad attempts to allocate fragment state */ 999 u_long fr_nfr; /* new fragment state kept */ 1000 u_long fr_cfr; /* add new fragment state but complete pkt */ 1001 u_long fr_bads; /* bad attempts to allocate packet state */ 1002 u_long fr_ads; /* new packet state kept */ 1003 u_long fr_chit; /* cached hit */ 1004 u_long fr_cmiss; /* cached miss */ 1005 u_long fr_tcpbad; /* TCP checksum check failures */ 1006 u_long fr_pull[2]; /* good and bad pullup attempts */ 1007 u_long fr_bad; /* bad IP packets to the filter */ 1008 u_long fr_ipv6; /* IPv6 packets in/out */ 1009 u_long fr_ppshit; /* dropped because of pps ceiling */ 1010 u_long fr_ipud; /* IP id update failures */ 1011 u_long fr_blocked[FRB_MAX_VALUE + 1]; 1012} ipf_statistics_t; 1013 1014/* 1015 * Log structure. Each packet header logged is prepended by one of these. 1016 * Following this in the log records read from the device will be an ipflog 1017 * structure which is then followed by any packet data. 1018 */ 1019typedef struct iplog { 1020 u_32_t ipl_magic; 1021 u_int ipl_count; 1022 u_32_t ipl_seqnum; 1023 struct timeval ipl_time; 1024 size_t ipl_dsize; 1025 struct iplog *ipl_next; 1026} iplog_t; 1027 1028#define ipl_sec ipl_time.tv_sec 1029#define ipl_usec ipl_time.tv_usec 1030 1031#define IPL_MAGIC 0x49504c4d /* 'IPLM' */ 1032#define IPL_MAGIC_NAT 0x49504c4e /* 'IPLN' */ 1033#define IPL_MAGIC_STATE 0x49504c53 /* 'IPLS' */ 1034#define IPLOG_SIZE sizeof(iplog_t) 1035 1036typedef struct ipflog { 1037#if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199603)) || \ 1038 (defined(OpenBSD) && (OpenBSD >= 199603)) 1039#else 1040 u_int fl_unit; 1041#endif 1042 u_32_t fl_rule; 1043 u_32_t fl_flags; 1044 u_32_t fl_lflags; 1045 u_32_t fl_logtag; 1046 ipftag_t fl_nattag; 1047 u_short fl_plen; /* extra data after hlen */ 1048 u_short fl_loglevel; /* syslog log level */ 1049 char fl_group[FR_GROUPLEN]; 1050 u_char fl_hlen; /* length of IP headers saved */ 1051 u_char fl_dir; 1052 u_char fl_breason; /* from fin_reason */ 1053 u_char fl_family; /* address family of packet logged */ 1054 char fl_ifname[LIFNAMSIZ]; 1055} ipflog_t; 1056 1057#ifndef IPF_LOGGING 1058# define IPF_LOGGING 0 1059#endif 1060#ifndef IPF_DEFAULT_PASS 1061# define IPF_DEFAULT_PASS FR_PASS 1062#endif 1063 1064#define DEFAULT_IPFLOGSIZE 32768 1065#ifndef IPFILTER_LOGSIZE 1066# define IPFILTER_LOGSIZE DEFAULT_IPFLOGSIZE 1067#else 1068# if IPFILTER_LOGSIZE < 8192 1069# error IPFILTER_LOGSIZE too small. Must be >= 8192 1070# endif 1071#endif 1072 1073#define IPF_OPTCOPY 0x07ff00 /* bit mask of copied options */ 1074 1075/* 1076 * Device filenames for reading log information. Use ipf on Solaris2 because 1077 * ipl is already a name used by something else. 1078 */ 1079#ifndef IPL_NAME 1080# if SOLARIS 1081# define IPL_NAME "/dev/ipf" 1082# else 1083# define IPL_NAME "/dev/ipl" 1084# endif 1085#endif 1086/* 1087 * Pathnames for various IP Filter control devices. Used by LKM 1088 * and userland, so defined here. 1089 */ 1090#define IPNAT_NAME "/dev/ipnat" 1091#define IPSTATE_NAME "/dev/ipstate" 1092#define IPAUTH_NAME "/dev/ipauth" 1093#define IPSYNC_NAME "/dev/ipsync" 1094#define IPSCAN_NAME "/dev/ipscan" 1095#define IPLOOKUP_NAME "/dev/iplookup" 1096 1097#define IPL_LOGIPF 0 /* Minor device #'s for accessing logs */ 1098#define IPL_LOGNAT 1 1099#define IPL_LOGSTATE 2 1100#define IPL_LOGAUTH 3 1101#define IPL_LOGSYNC 4 1102#define IPL_LOGSCAN 5 1103#define IPL_LOGLOOKUP 6 1104#define IPL_LOGCOUNT 7 1105#define IPL_LOGMAX 7 1106#define IPL_LOGSIZE IPL_LOGMAX + 1 1107#define IPL_LOGALL -1 1108#define IPL_LOGNONE -2 1109 1110/* 1111 * For SIOCGETFS 1112 */ 1113typedef struct friostat { 1114 ipf_statistics_t f_st[2]; 1115 frentry_t *f_ipf[2][2]; 1116 frentry_t *f_acct[2][2]; 1117 frentry_t *f_auth; 1118 struct frgroup *f_groups[IPL_LOGSIZE][2]; 1119 u_long f_froute[2]; 1120 u_long f_log_ok; 1121 u_long f_log_fail; 1122 u_long f_rb_no_mem; 1123 u_long f_rb_node_max; 1124 u_32_t f_ticks; 1125 int f_locks[IPL_LOGSIZE]; 1126 int f_defpass; /* default pass - from fr_pass */ 1127 int f_active; /* 1 or 0 - active rule set */ 1128 int f_running; /* 1 if running, else 0 */ 1129 int f_logging; /* 1 if enabled, else 0 */ 1130 int f_features; 1131 char f_version[32]; /* version string */ 1132} friostat_t; 1133 1134#define f_fin f_ipf[0] 1135#define f_fout f_ipf[1] 1136#define f_acctin f_acct[0] 1137#define f_acctout f_acct[1] 1138 1139#define IPF_FEAT_LKM 0x001 1140#define IPF_FEAT_LOG 0x002 1141#define IPF_FEAT_LOOKUP 0x004 1142#define IPF_FEAT_BPF 0x008 1143#define IPF_FEAT_COMPILED 0x010 1144#define IPF_FEAT_CKSUM 0x020 1145#define IPF_FEAT_SYNC 0x040 1146#define IPF_FEAT_SCAN 0x080 1147#define IPF_FEAT_IPV6 0x100 1148 1149typedef struct optlist { 1150 u_short ol_val; 1151 int ol_bit; 1152} optlist_t; 1153 1154 1155/* 1156 * Group list structure. 1157 */ 1158typedef struct frgroup { 1159 struct frgroup *fg_next; 1160 struct frentry *fg_head; 1161 struct frentry *fg_start; 1162 struct frgroup **fg_set; 1163 u_32_t fg_flags; 1164 int fg_ref; 1165 char fg_name[FR_GROUPLEN]; 1166} frgroup_t; 1167 1168#define FG_NAME(g) (*(g)->fg_name == '\0' ? "" : (g)->fg_name) 1169 1170 1171/* 1172 * Used by state and NAT tables 1173 */ 1174typedef struct icmpinfo { 1175 u_short ici_id; 1176 u_short ici_seq; 1177 u_char ici_type; 1178} icmpinfo_t; 1179 1180typedef struct udpinfo { 1181 u_short us_sport; 1182 u_short us_dport; 1183} udpinfo_t; 1184 1185 1186typedef struct tcpdata { 1187 u_32_t td_end; 1188 u_32_t td_maxend; 1189 u_32_t td_maxwin; 1190 u_32_t td_winscale; 1191 u_32_t td_maxseg; 1192 int td_winflags; 1193} tcpdata_t; 1194 1195#define TCP_WSCALE_MAX 14 1196 1197#define TCP_WSCALE_SEEN 0x00000001 1198#define TCP_WSCALE_FIRST 0x00000002 1199#define TCP_SACK_PERMIT 0x00000004 1200 1201 1202typedef struct tcpinfo { 1203 u_32_t ts_sport; 1204 u_32_t ts_dport; 1205 tcpdata_t ts_data[2]; 1206} tcpinfo_t; 1207 1208 1209/* 1210 * Structures to define a GRE header as seen in a packet. 1211 */ 1212struct grebits { 1213#if defined(sparc) 1214 u_32_t grb_ver:3; 1215 u_32_t grb_flags:3; 1216 u_32_t grb_A:1; 1217 u_32_t grb_recur:1; 1218 u_32_t grb_s:1; 1219 u_32_t grb_S:1; 1220 u_32_t grb_K:1; 1221 u_32_t grb_R:1; 1222 u_32_t grb_C:1; 1223#else 1224 u_32_t grb_C:1; 1225 u_32_t grb_R:1; 1226 u_32_t grb_K:1; 1227 u_32_t grb_S:1; 1228 u_32_t grb_s:1; 1229 u_32_t grb_recur:1; 1230 u_32_t grb_A:1; 1231 u_32_t grb_flags:3; 1232 u_32_t grb_ver:3; 1233#endif 1234 u_short grb_ptype; 1235}; 1236 1237typedef struct grehdr { 1238 union { 1239 struct grebits gru_bits; 1240 u_short gru_flags; 1241 } gr_un; 1242 u_short gr_len; 1243 u_short gr_call; 1244} grehdr_t; 1245 1246#define gr_flags gr_un.gru_flags 1247#define gr_bits gr_un.gru_bits 1248#define gr_ptype gr_bits.grb_ptype 1249#define gr_C gr_bits.grb_C 1250#define gr_R gr_bits.grb_R 1251#define gr_K gr_bits.grb_K 1252#define gr_S gr_bits.grb_S 1253#define gr_s gr_bits.grb_s 1254#define gr_recur gr_bits.grb_recur 1255#define gr_A gr_bits.grb_A 1256#define gr_ver gr_bits.grb_ver 1257 1258/* 1259 * GRE information tracked by "keep state" 1260 */ 1261typedef struct greinfo { 1262 u_short gs_call[2]; 1263 u_short gs_flags; 1264 u_short gs_ptype; 1265} greinfo_t; 1266 1267#define GRE_REV(x) ((ntohs(x) >> 13) & 7) 1268 1269 1270/* 1271 * Format of an Authentication header 1272 */ 1273typedef struct authhdr { 1274 u_char ah_next; 1275 u_char ah_plen; 1276 u_short ah_reserved; 1277 u_32_t ah_spi; 1278 u_32_t ah_seq; 1279 /* Following the sequence number field is 0 or more bytes of */ 1280 /* authentication data, as specified by ah_plen - RFC 2402. */ 1281} authhdr_t; 1282 1283 1284/* 1285 * Timeout tail queue list member 1286 */ 1287typedef struct ipftqent { 1288 struct ipftqent **tqe_pnext; 1289 struct ipftqent *tqe_next; 1290 struct ipftq *tqe_ifq; 1291 void *tqe_parent; /* pointer back to NAT/state struct */ 1292 u_32_t tqe_die; /* when this entriy is to die */ 1293 u_32_t tqe_touched; 1294 int tqe_flags; 1295 int tqe_state[2]; /* current state of this entry */ 1296} ipftqent_t; 1297 1298#define TQE_RULEBASED 0x00000001 1299#define TQE_DELETE 0x00000002 1300 1301 1302/* 1303 * Timeout tail queue head for IPFilter 1304 */ 1305typedef struct ipftq { 1306 ipfmutex_t ifq_lock; 1307 u_int ifq_ttl; 1308 ipftqent_t *ifq_head; 1309 ipftqent_t **ifq_tail; 1310 struct ipftq *ifq_next; 1311 struct ipftq **ifq_pnext; 1312 int ifq_ref; 1313 u_int ifq_flags; 1314} ipftq_t; 1315 1316#define IFQF_USER 0x01 /* User defined aging */ 1317#define IFQF_DELETE 0x02 /* Marked for deletion */ 1318#define IFQF_PROXY 0x04 /* Timeout queue in use by a proxy */ 1319 1320#define IPFTQ_INIT(x,y,z) do { \ 1321 (x)->ifq_ttl = (y); \ 1322 (x)->ifq_head = NULL; \ 1323 (x)->ifq_ref = 1; \ 1324 (x)->ifq_tail = &(x)->ifq_head; \ 1325 MUTEX_INIT(&(x)->ifq_lock, (z)); \ 1326 } while (0) 1327 1328#define IPF_HZ_MULT 1 1329#define IPF_HZ_DIVIDE 2 /* How many times a second ipfilter */ 1330 /* checks its timeout queues. */ 1331#define IPF_TTLVAL(x) (((x) / IPF_HZ_MULT) * IPF_HZ_DIVIDE) 1332 1333typedef int (*ipftq_delete_fn_t)(struct ipf_main_softc_s *, void *); 1334 1335 1336/* 1337 * Object structure description. For passing through in ioctls. 1338 */ 1339typedef struct ipfobj { 1340 u_32_t ipfo_rev; /* IPFilter version number */ 1341 u_32_t ipfo_size; /* size of object at ipfo_ptr */ 1342 void *ipfo_ptr; /* pointer to object */ 1343 int ipfo_type; /* type of object being pointed to */ 1344 int ipfo_offset; /* bytes from ipfo_ptr where to start */ 1345 int ipfo_retval; /* return value */ 1346 u_char ipfo_xxxpad[28]; /* reserved for future use */ 1347} ipfobj_t; 1348 1349#define IPFOBJ_FRENTRY 0 /* struct frentry */ 1350#define IPFOBJ_IPFSTAT 1 /* struct friostat */ 1351#define IPFOBJ_IPFINFO 2 /* struct fr_info */ 1352#define IPFOBJ_AUTHSTAT 3 /* struct fr_authstat */ 1353#define IPFOBJ_FRAGSTAT 4 /* struct ipfrstat */ 1354#define IPFOBJ_IPNAT 5 /* struct ipnat */ 1355#define IPFOBJ_NATSTAT 6 /* struct natstat */ 1356#define IPFOBJ_STATESAVE 7 /* struct ipstate_save */ 1357#define IPFOBJ_NATSAVE 8 /* struct nat_save */ 1358#define IPFOBJ_NATLOOKUP 9 /* struct natlookup */ 1359#define IPFOBJ_IPSTATE 10 /* struct ipstate */ 1360#define IPFOBJ_STATESTAT 11 /* struct ips_stat */ 1361#define IPFOBJ_FRAUTH 12 /* struct frauth */ 1362#define IPFOBJ_TUNEABLE 13 /* struct ipftune */ 1363#define IPFOBJ_NAT 14 /* struct nat */ 1364#define IPFOBJ_IPFITER 15 /* struct ipfruleiter */ 1365#define IPFOBJ_GENITER 16 /* struct ipfgeniter */ 1366#define IPFOBJ_GTABLE 17 /* struct ipftable */ 1367#define IPFOBJ_LOOKUPITER 18 /* struct ipflookupiter */ 1368#define IPFOBJ_STATETQTAB 19 /* struct ipftq * NSTATES */ 1369#define IPFOBJ_IPFEXPR 20 1370#define IPFOBJ_PROXYCTL 21 /* strct ap_ctl */ 1371#define IPFOBJ_FRIPF 22 /* structfripf */ 1372#define IPFOBJ_COUNT 23 /* How many #defines are above this? */ 1373 1374 1375typedef union ipftunevalptr { 1376 void *ipftp_void; 1377 u_long *ipftp_long; 1378 u_int *ipftp_int; 1379 u_short *ipftp_short; 1380 u_char *ipftp_char; 1381 u_long ipftp_offset; 1382} ipftunevalptr_t; 1383 1384typedef union ipftuneval { 1385 u_long ipftu_long; 1386 u_int ipftu_int; 1387 u_short ipftu_short; 1388 u_char ipftu_char; 1389} ipftuneval_t; 1390 1391struct ipftuneable; 1392typedef int (* ipftunefunc_t) __P((struct ipf_main_softc_s *, struct ipftuneable *, ipftuneval_t *)); 1393 1394typedef struct ipftuneable { 1395 ipftunevalptr_t ipft_una; 1396 const char *ipft_name; 1397 u_long ipft_min; 1398 u_long ipft_max; 1399 int ipft_sz; 1400 int ipft_flags; 1401 struct ipftuneable *ipft_next; 1402 ipftunefunc_t ipft_func; 1403} ipftuneable_t; 1404 1405#define ipft_addr ipft_una.ipftp_void 1406#define ipft_plong ipft_una.ipftp_long 1407#define ipft_pint ipft_una.ipftp_int 1408#define ipft_pshort ipft_una.ipftp_short 1409#define ipft_pchar ipft_una.ipftp_char 1410 1411#define IPFT_RDONLY 1 /* read-only */ 1412#define IPFT_WRDISABLED 2 /* write when disabled only */ 1413 1414typedef struct ipftune { 1415 void *ipft_cookie; 1416 ipftuneval_t ipft_un; 1417 u_long ipft_min; 1418 u_long ipft_max; 1419 int ipft_sz; 1420 int ipft_flags; 1421 char ipft_name[80]; 1422} ipftune_t; 1423 1424#define ipft_vlong ipft_un.ipftu_long 1425#define ipft_vint ipft_un.ipftu_int 1426#define ipft_vshort ipft_un.ipftu_short 1427#define ipft_vchar ipft_un.ipftu_char 1428 1429/* 1430 * Hash table header 1431 */ 1432#define IPFHASH(x,y) typedef struct { \ 1433 ipfrwlock_t ipfh_lock; \ 1434 struct x *ipfh_head; \ 1435 } y 1436 1437/* 1438** HPUX Port 1439*/ 1440#ifdef __hpux 1441/* HP-UX locking sequence deadlock detection module lock MAJOR ID */ 1442# define IPF_SMAJ 0 /* temp assignment XXX, not critical */ 1443#endif 1444 1445#if !defined(CDEV_MAJOR) && defined (__FreeBSD_version) && \ 1446 (__FreeBSD_version >= 220000) 1447# define CDEV_MAJOR 79 1448#endif 1449 1450/* 1451 * Post NetBSD 1.2 has the PFIL interface for packet filters. This turns 1452 * on those hooks. We don't need any special mods in non-IP Filter code 1453 * with this! 1454 */ 1455#if (defined(NetBSD) && (NetBSD > 199609) && (NetBSD <= 1991011)) || \ 1456 (defined(NetBSD1_2) && NetBSD1_2 > 1) || \ 1457 (defined(__FreeBSD__) && (__FreeBSD_version >= 500043)) 1458# if (defined(NetBSD) && NetBSD >= 199905) 1459# define PFIL_HOOKS 1460# endif 1461# ifdef PFIL_HOOKS 1462# define NETBSD_PF 1463# endif 1464#endif 1465 1466#ifdef _KERNEL 1467# define FR_VERBOSE(verb_pr) 1468# define FR_DEBUG(verb_pr) 1469#else 1470extern void ipfkdebug __P((char *, ...)); 1471extern void ipfkverbose __P((char *, ...)); 1472# define FR_VERBOSE(verb_pr) ipfkverbose verb_pr 1473# define FR_DEBUG(verb_pr) ipfkdebug verb_pr 1474#endif 1475 1476/* 1477 * 1478 */ 1479typedef struct ipfruleiter { 1480 int iri_inout; 1481 char iri_group[FR_GROUPLEN]; 1482 int iri_active; 1483 int iri_nrules; 1484 int iri_v; /* No longer used (compatibility) */ 1485 frentry_t *iri_rule; 1486} ipfruleiter_t; 1487 1488/* 1489 * Values for iri_inout 1490 */ 1491#define F_IN 0 1492#define F_OUT 1 1493#define F_ACIN 2 1494#define F_ACOUT 3 1495 1496 1497typedef struct ipfgeniter { 1498 int igi_type; 1499 int igi_nitems; 1500 void *igi_data; 1501} ipfgeniter_t; 1502 1503#define IPFGENITER_IPF 0 1504#define IPFGENITER_NAT 1 1505#define IPFGENITER_IPNAT 2 1506#define IPFGENITER_FRAG 3 1507#define IPFGENITER_AUTH 4 1508#define IPFGENITER_STATE 5 1509#define IPFGENITER_NATFRAG 6 1510#define IPFGENITER_HOSTMAP 7 1511#define IPFGENITER_LOOKUP 8 1512 1513typedef struct ipftable { 1514 int ita_type; 1515 void *ita_table; 1516} ipftable_t; 1517 1518#define IPFTABLE_BUCKETS 1 1519#define IPFTABLE_BUCKETS_NATIN 2 1520#define IPFTABLE_BUCKETS_NATOUT 3 1521 1522 1523typedef struct ipf_v4_masktab_s { 1524 u_32_t imt4_active[33]; 1525 int imt4_masks[33]; 1526 int imt4_max; 1527} ipf_v4_masktab_t; 1528 1529typedef struct ipf_v6_masktab_s { 1530 i6addr_t imt6_active[129]; 1531 int imt6_masks[129]; 1532 int imt6_max; 1533} ipf_v6_masktab_t; 1534 1535 1536/* 1537 * 1538 */ 1539typedef struct ipftoken { 1540 struct ipftoken *ipt_next; 1541 struct ipftoken **ipt_pnext; 1542 void *ipt_ctx; 1543 void *ipt_data; 1544 u_long ipt_die; 1545 int ipt_type; 1546 int ipt_uid; 1547 int ipt_subtype; 1548 int ipt_ref; 1549 int ipt_complete; 1550} ipftoken_t; 1551 1552 1553/* 1554 * 1555 */ 1556typedef struct ipfexp { 1557 int ipfe_cmd; 1558 int ipfe_not; 1559 int ipfe_narg; 1560 int ipfe_size; 1561 int ipfe_arg0[1]; 1562} ipfexp_t; 1563 1564/* 1565 * Currently support commands (ipfe_cmd) 1566 * 32bits is split up follows: 1567 * aabbcccc 1568 * aa = 0 = packet matching, 1 = meta data matching 1569 * bb = IP protocol number 1570 * cccc = command 1571 */ 1572#define IPF_EXP_IP_PR 0x00000001 1573#define IPF_EXP_IP_ADDR 0x00000002 1574#define IPF_EXP_IP_SRCADDR 0x00000003 1575#define IPF_EXP_IP_DSTADDR 0x00000004 1576#define IPF_EXP_IP6_ADDR 0x00000005 1577#define IPF_EXP_IP6_SRCADDR 0x00000006 1578#define IPF_EXP_IP6_DSTADDR 0x00000007 1579#define IPF_EXP_TCP_FLAGS 0x00060001 1580#define IPF_EXP_TCP_PORT 0x00060002 1581#define IPF_EXP_TCP_SPORT 0x00060003 1582#define IPF_EXP_TCP_DPORT 0x00060004 1583#define IPF_EXP_UDP_PORT 0x00110002 1584#define IPF_EXP_UDP_SPORT 0x00110003 1585#define IPF_EXP_UDP_DPORT 0x00110004 1586#define IPF_EXP_IDLE_GT 0x01000001 1587#define IPF_EXP_TCP_STATE 0x01060002 1588#define IPF_EXP_END 0xffffffff 1589 1590#define ONE_DAY IPF_TTLVAL(1 * 86400) /* 1 day */ 1591#define FIVE_DAYS (5 * ONE_DAY) 1592 1593typedef struct ipf_main_softc_s { 1594 struct ipf_main_softc_s *ipf_next; 1595 ipfmutex_t ipf_rw; 1596 ipfmutex_t ipf_timeoutlock; 1597 ipfrwlock_t ipf_mutex; 1598 ipfrwlock_t ipf_frag; 1599 ipfrwlock_t ipf_global; 1600 ipfrwlock_t ipf_tokens; 1601 ipfrwlock_t ipf_state; 1602 ipfrwlock_t ipf_nat; 1603 ipfrwlock_t ipf_natfrag; 1604 ipfrwlock_t ipf_poolrw; 1605 int ipf_dynamic_softc; 1606 int ipf_refcnt; 1607 int ipf_running; 1608 int ipf_flags; 1609 int ipf_active; 1610 int ipf_control_forwarding; 1611 int ipf_update_ipid; 1612 int ipf_chksrc; /* causes a system crash if enabled */ 1613 int ipf_pass; 1614 int ipf_minttl; 1615 int ipf_icmpminfragmtu; 1616 int ipf_interror; /* Should be in a struct that is per */ 1617 /* thread or process. Does not belong */ 1618 /* here but there's a lot more work */ 1619 /* in doing that properly. For now, */ 1620 /* it is squatting. */ 1621 u_int ipf_tcpidletimeout; 1622 u_int ipf_tcpclosewait; 1623 u_int ipf_tcplastack; 1624 u_int ipf_tcptimewait; 1625 u_int ipf_tcptimeout; 1626 u_int ipf_tcpsynsent; 1627 u_int ipf_tcpsynrecv; 1628 u_int ipf_tcpclosed; 1629 u_int ipf_tcphalfclosed; 1630 u_int ipf_udptimeout; 1631 u_int ipf_udpacktimeout; 1632 u_int ipf_icmptimeout; 1633 u_int ipf_icmpacktimeout; 1634 u_int ipf_iptimeout; 1635 u_long ipf_ticks; 1636 u_long ipf_userifqs; 1637 u_long ipf_rb_no_mem; 1638 u_long ipf_rb_node_max; 1639 u_long ipf_frouteok[2]; 1640 ipftuneable_t *ipf_tuners; 1641 void *ipf_frag_soft; 1642 void *ipf_nat_soft; 1643 void *ipf_state_soft; 1644 void *ipf_auth_soft; 1645 void *ipf_proxy_soft; 1646 void *ipf_sync_soft; 1647 void *ipf_lookup_soft; 1648 void *ipf_log_soft; 1649 struct frgroup *ipf_groups[IPL_LOGSIZE][2]; 1650 frentry_t *ipf_rules[2][2]; 1651 frentry_t *ipf_acct[2][2]; 1652 frentry_t *ipf_rule_explist[2]; 1653 ipftoken_t *ipf_token_head; 1654 ipftoken_t **ipf_token_tail; 1655#if defined(__FreeBSD_version) && (__FreeBSD_version >= 300000) && \ 1656 defined(_KERNEL) 1657 struct callout ipf_slow_ch; 1658#endif 1659#if defined(linux) && defined(_KERNEL) 1660 struct timer_list ipf_timer; 1661#endif 1662#if NETBSD_GE_REV(104040000) 1663 struct callout ipf_slow_ch; 1664#endif 1665#if SOLARIS 1666# if SOLARIS2 >= 7 1667 timeout_id_t ipf_slow_ch; 1668# else 1669 int ipf_slow_ch; 1670# endif 1671#endif 1672#if defined(_KERNEL) 1673# if SOLARIS 1674 struct pollhead ipf_poll_head[IPL_LOGSIZE]; 1675 void *ipf_dip; 1676# if defined(INSTANCES) 1677 int ipf_get_loopback; 1678 u_long ipf_idnum; 1679 net_handle_t ipf_nd_v4; 1680 net_handle_t ipf_nd_v6; 1681 hook_t *ipf_hk_v4_in; 1682 hook_t *ipf_hk_v4_out; 1683 hook_t *ipf_hk_v4_nic; 1684 hook_t *ipf_hk_v6_in; 1685 hook_t *ipf_hk_v6_out; 1686 hook_t *ipf_hk_v6_nic; 1687 hook_t *ipf_hk_loop_v4_in; 1688 hook_t *ipf_hk_loop_v4_out; 1689 hook_t *ipf_hk_loop_v6_in; 1690 hook_t *ipf_hk_loop_v6_out; 1691# endif 1692# else 1693# if defined(linux) && defined(_KERNEL) 1694 struct poll_table_struct ipf_selwait[IPL_LOGSIZE]; 1695 wait_queue_head_t iplh_linux[IPL_LOGSIZE]; 1696# else 1697 struct selinfo ipf_selwait[IPL_LOGSIZE]; 1698# endif 1699# endif 1700#endif 1701 void *ipf_slow; 1702 ipf_statistics_t ipf_stats[2]; 1703 u_char ipf_iss_secret[32]; 1704 u_short ipf_ip_id; 1705} ipf_main_softc_t; 1706 1707#define IPFERROR(_e) do { softc->ipf_interror = (_e); \ 1708 DT1(user_error, int, _e); \ 1709 } while (0) 1710 1711#ifndef _KERNEL 1712extern int ipf_check __P((void *, struct ip *, int, void *, int, mb_t **)); 1713extern int (*ipf_checkp) __P((ip_t *, int, void *, int, mb_t **)); 1714extern struct ifnet *get_unit __P((char *, int)); 1715extern char *get_ifname __P((struct ifnet *)); 1716extern int ipfioctl __P((ipf_main_softc_t *, int, ioctlcmd_t, 1717 caddr_t, int)); 1718extern void m_freem __P((mb_t *)); 1719extern size_t msgdsize __P((mb_t *)); 1720extern int bcopywrap __P((void *, void *, size_t)); 1721#else /* #ifndef _KERNEL */ 1722# if defined(__NetBSD__) && defined(PFIL_HOOKS) 1723extern void ipfilterattach __P((int)); 1724# endif 1725extern int ipl_enable __P((void)); 1726extern int ipl_disable __P((void)); 1727# ifdef MENTAT 1728extern int ipf_check __P((void *, struct ip *, int, void *, int, void *, 1729 mblk_t **)); 1730# if SOLARIS 1731extern void ipf_prependmbt(fr_info_t *, mblk_t *); 1732# if SOLARIS2 >= 7 1733extern int ipfioctl __P((dev_t, int, intptr_t, int, cred_t *, int *)); 1734# else 1735extern int ipfioctl __P((dev_t, int, int *, int, cred_t *, int *)); 1736# endif 1737# endif 1738# ifdef __hpux 1739extern int ipfioctl __P((dev_t, int, caddr_t, int)); 1740extern int ipf_select __P((dev_t, int)); 1741# endif 1742extern int ipf_qout __P((queue_t *, mblk_t *)); 1743# else /* MENTAT */ 1744extern int ipf_check __P((void *, struct ip *, int, void *, int, mb_t **)); 1745extern int (*fr_checkp) __P((ip_t *, int, void *, int, mb_t **)); 1746extern size_t mbufchainlen __P((mb_t *)); 1747# ifdef __sgi 1748# include <sys/cred.h> 1749extern int ipfioctl __P((dev_t, int, caddr_t, int, cred_t *, int *)); 1750extern int ipfilter_sgi_attach __P((void)); 1751extern void ipfilter_sgi_detach __P((void)); 1752extern void ipfilter_sgi_intfsync __P((void)); 1753# else 1754# ifdef IPFILTER_LKM 1755extern int ipf_identify __P((char *)); 1756# endif 1757# if BSDOS_GE_REV(199510) || FREEBSD_GE_REV(220000) || \ 1758 (defined(NetBSD) && (NetBSD >= 199511)) || defined(__OpenBSD__) 1759# if defined(__NetBSD__) || BSDOS_GE_REV(199701) || \ 1760 defined(__OpenBSD__) || FREEBSD_GE_REV(300000) 1761# if (__FreeBSD_version >= 500024) 1762# if (__FreeBSD_version >= 502116) 1763extern int ipfioctl __P((struct cdev*, u_long, caddr_t, int, struct thread *)); 1764# else 1765extern int ipfioctl __P((dev_t, u_long, caddr_t, int, struct thread *)); 1766# endif /* __FreeBSD_version >= 502116 */ 1767# else 1768# if NETBSD_GE_REV(499001000) 1769extern int ipfioctl __P((dev_t, u_long, void *, int, struct lwp *)); 1770# else 1771# if NETBSD_GE_REV(399001400) 1772extern int ipfioctl __P((dev_t, u_long, caddr_t, int, struct lwp *)); 1773# else 1774extern int ipfioctl __P((dev_t, u_long, caddr_t, int, struct proc *)); 1775# endif 1776# endif 1777# endif /* __FreeBSD_version >= 500024 */ 1778# else 1779extern int ipfioctl __P((dev_t, int, caddr_t, int, struct proc *)); 1780# endif 1781# else 1782# ifdef linux 1783extern int ipfioctl __P((struct inode *, struct file *, u_int, u_long)); 1784# else 1785extern int ipfioctl __P((dev_t, int, caddr_t, int)); 1786# endif 1787# endif /* (_BSDI_VERSION >= 199510) */ 1788# endif /* __ sgi */ 1789# endif /* MENTAT */ 1790 1791# if defined(__FreeBSD_version) 1792extern int ipf_pfil_hook __P((void)); 1793extern int ipf_pfil_unhook __P((void)); 1794extern void ipf_event_reg __P((void)); 1795extern void ipf_event_dereg __P((void)); 1796# endif 1797 1798# if defined(INSTANCES) 1799extern ipf_main_softc_t *ipf_find_softc __P((u_long)); 1800extern int ipf_set_loopback __P((ipf_main_softc_t *, ipftuneable_t *, 1801 ipftuneval_t *)); 1802# endif 1803 1804#endif /* #ifndef _KERNEL */ 1805 1806extern char *memstr __P((const char *, char *, size_t, size_t)); 1807extern int count4bits __P((u_32_t)); 1808#ifdef USE_INET6 1809extern int count6bits __P((u_32_t *)); 1810#endif 1811extern int frrequest __P((ipf_main_softc_t *, int, ioctlcmd_t, caddr_t, 1812 int, int)); 1813extern char *getifname __P((struct ifnet *)); 1814extern int ipfattach __P((ipf_main_softc_t *)); 1815extern int ipfdetach __P((ipf_main_softc_t *)); 1816extern u_short ipf_cksum __P((u_short *, int)); 1817extern int copyinptr __P((ipf_main_softc_t *, void *, void *, size_t)); 1818extern int copyoutptr __P((ipf_main_softc_t *, void *, void *, size_t)); 1819extern int ipf_fastroute __P((mb_t *, mb_t **, fr_info_t *, frdest_t *)); 1820extern int ipf_inject __P((fr_info_t *, mb_t *)); 1821extern int ipf_inobj __P((ipf_main_softc_t *, void *, ipfobj_t *, 1822 void *, int)); 1823extern int ipf_inobjsz __P((ipf_main_softc_t *, void *, void *, 1824 int , int)); 1825extern int ipf_ioctlswitch __P((ipf_main_softc_t *, int, void *, 1826 ioctlcmd_t, int, int, void *)); 1827extern int ipf_ipf_ioctl __P((ipf_main_softc_t *, caddr_t, ioctlcmd_t, 1828 int, int, void *)); 1829extern int ipf_ipftune __P((ipf_main_softc_t *, ioctlcmd_t, void *)); 1830extern int ipf_matcharray_load __P((ipf_main_softc_t *, caddr_t, 1831 ipfobj_t *, int **)); 1832extern int ipf_matcharray_verify __P((int *, int)); 1833extern int ipf_outobj __P((ipf_main_softc_t *, void *, void *, int)); 1834extern int ipf_outobjk __P((ipf_main_softc_t *, ipfobj_t *, void *)); 1835extern int ipf_outobjsz __P((ipf_main_softc_t *, void *, void *, 1836 int, int)); 1837extern void *ipf_pullup __P((mb_t *, fr_info_t *, int)); 1838extern int ipf_resolvedest __P((ipf_main_softc_t *, char *, 1839 struct frdest *, int)); 1840extern int ipf_resolvefunc __P((ipf_main_softc_t *, void *)); 1841extern void *ipf_resolvenic __P((ipf_main_softc_t *, char *, int)); 1842extern int ipf_send_icmp_err __P((int, fr_info_t *, int)); 1843extern int ipf_send_reset __P((fr_info_t *)); 1844#if (defined(__FreeBSD_version) && (__FreeBSD_version < 501000)) || \ 1845 !defined(_KERNEL) || defined(linux) 1846#endif 1847extern void ipf_apply_timeout __P((ipftq_t *, u_int)); 1848extern ipftq_t *ipf_addtimeoutqueue __P((ipf_main_softc_t *, ipftq_t **, 1849 u_int)); 1850extern void ipf_deletequeueentry __P((ipftqent_t *)); 1851extern int ipf_deletetimeoutqueue __P((ipftq_t *)); 1852extern void ipf_freetimeoutqueue __P((ipf_main_softc_t *, ipftq_t *)); 1853extern void ipf_movequeue __P((u_long, ipftqent_t *, ipftq_t *, 1854 ipftq_t *)); 1855extern void ipf_queueappend __P((u_long, ipftqent_t *, ipftq_t *, void *)); 1856extern void ipf_queueback __P((u_long, ipftqent_t *)); 1857extern int ipf_queueflush __P((ipf_main_softc_t *, ipftq_delete_fn_t, 1858 ipftq_t *, ipftq_t *, u_int *, int, int)); 1859extern void ipf_queuefront __P((ipftqent_t *)); 1860extern int ipf_settimeout_tcp __P((ipftuneable_t *, ipftuneval_t *, 1861 ipftq_t *)); 1862extern int ipf_checkv4sum __P((fr_info_t *)); 1863extern int ipf_checkl4sum __P((fr_info_t *)); 1864extern int ipf_ifpfillv4addr __P((int, struct sockaddr_in *, 1865 struct sockaddr_in *, struct in_addr *, 1866 struct in_addr *)); 1867extern int ipf_coalesce __P((fr_info_t *)); 1868#ifdef USE_INET6 1869extern int ipf_checkv6sum __P((fr_info_t *)); 1870extern int ipf_ifpfillv6addr __P((int, struct sockaddr_in6 *, 1871 struct sockaddr_in6 *, i6addr_t *, 1872 i6addr_t *)); 1873#endif 1874 1875extern int ipf_tune_add __P((ipf_main_softc_t *, ipftuneable_t *)); 1876extern int ipf_tune_add_array __P((ipf_main_softc_t *, ipftuneable_t *)); 1877extern int ipf_tune_del __P((ipf_main_softc_t *, ipftuneable_t *)); 1878extern int ipf_tune_del_array __P((ipf_main_softc_t *, ipftuneable_t *)); 1879extern int ipf_tune_array_link __P((ipf_main_softc_t *, ipftuneable_t *)); 1880extern int ipf_tune_array_unlink __P((ipf_main_softc_t *, 1881 ipftuneable_t *)); 1882extern ipftuneable_t *ipf_tune_array_copy __P((void *, size_t, 1883 ipftuneable_t *)); 1884 1885extern int ipf_pr_pullup __P((fr_info_t *, int)); 1886 1887extern int ipf_flush __P((ipf_main_softc_t *, minor_t, int)); 1888extern frgroup_t *ipf_group_add __P((ipf_main_softc_t *, char *, void *, 1889 u_32_t, minor_t, int)); 1890extern void ipf_group_del __P((ipf_main_softc_t *, frgroup_t *, 1891 frentry_t *)); 1892extern int ipf_derefrule __P((ipf_main_softc_t *, frentry_t **)); 1893extern frgroup_t *ipf_findgroup __P((ipf_main_softc_t *, char *, minor_t, 1894 int, frgroup_t ***)); 1895 1896extern int ipf_log_init __P((void)); 1897extern int ipf_log_bytesused __P((ipf_main_softc_t *, int)); 1898extern int ipf_log_canread __P((ipf_main_softc_t *, int)); 1899extern int ipf_log_clear __P((ipf_main_softc_t *, minor_t)); 1900extern u_long ipf_log_failures __P((ipf_main_softc_t *, int)); 1901extern int ipf_log_read __P((ipf_main_softc_t *, minor_t, uio_t *)); 1902extern int ipf_log_items __P((ipf_main_softc_t *, int, fr_info_t *, 1903 void **, size_t *, int *, int)); 1904extern u_long ipf_log_logok __P((ipf_main_softc_t *, int)); 1905extern void ipf_log_unload __P((ipf_main_softc_t *)); 1906extern int ipf_log_pkt __P((fr_info_t *, u_int)); 1907 1908extern frentry_t *ipf_acctpkt __P((fr_info_t *, u_32_t *)); 1909extern u_short fr_cksum __P((fr_info_t *, ip_t *, int, void *)); 1910extern void ipf_deinitialise __P((ipf_main_softc_t *)); 1911extern int ipf_deliverlocal __P((ipf_main_softc_t *, int, void *, 1912 i6addr_t *)); 1913extern frentry_t *ipf_dstgrpmap __P((fr_info_t *, u_32_t *)); 1914extern void ipf_fixskip __P((frentry_t **, frentry_t *, int)); 1915extern void ipf_forgetifp __P((ipf_main_softc_t *, void *)); 1916extern frentry_t *ipf_getrulen __P((ipf_main_softc_t *, int, char *, 1917 u_32_t)); 1918extern int ipf_ifpaddr __P((ipf_main_softc_t *, int, int, void *, 1919 i6addr_t *, i6addr_t *)); 1920extern void ipf_inet_mask_add __P((int, ipf_v4_masktab_t *)); 1921extern void ipf_inet_mask_del __P((int, ipf_v4_masktab_t *)); 1922#ifdef USE_INET6 1923extern void ipf_inet6_mask_add __P((int, i6addr_t *, 1924 ipf_v6_masktab_t *)); 1925extern void ipf_inet6_mask_del __P((int, i6addr_t *, 1926 ipf_v6_masktab_t *)); 1927#endif 1928extern int ipf_initialise __P((void)); 1929extern int ipf_lock __P((caddr_t, int *)); 1930extern int ipf_makefrip __P((int, ip_t *, fr_info_t *)); 1931extern int ipf_matchtag __P((ipftag_t *, ipftag_t *)); 1932extern int ipf_matchicmpqueryreply __P((int, icmpinfo_t *, 1933 struct icmp *, int)); 1934extern u_32_t ipf_newisn __P((fr_info_t *)); 1935extern u_short ipf_nextipid __P((fr_info_t *)); 1936extern u_int ipf_pcksum __P((fr_info_t *, int, u_int)); 1937extern void ipf_rule_expire __P((ipf_main_softc_t *)); 1938extern int ipf_scanlist __P((fr_info_t *, u_32_t)); 1939extern frentry_t *ipf_srcgrpmap __P((fr_info_t *, u_32_t *)); 1940extern int ipf_tcpudpchk __P((fr_ip_t *, frtuc_t *)); 1941extern int ipf_verifysrc __P((fr_info_t *fin)); 1942extern int ipf_zerostats __P((ipf_main_softc_t *, char *)); 1943extern int ipf_getnextrule __P((ipf_main_softc_t *, ipftoken_t *, 1944 void *)); 1945extern int ipf_sync __P((ipf_main_softc_t *, void *)); 1946extern int ipf_token_deref __P((ipf_main_softc_t *, ipftoken_t *)); 1947extern void ipf_token_expire __P((ipf_main_softc_t *)); 1948extern ipftoken_t *ipf_token_find __P((ipf_main_softc_t *, int, int, 1949 void *)); 1950extern int ipf_token_del __P((ipf_main_softc_t *, int, int, 1951 void *)); 1952extern void ipf_token_mark_complete __P((ipftoken_t *)); 1953extern int ipf_genericiter __P((ipf_main_softc_t *, void *, 1954 int, void *)); 1955#ifdef IPFILTER_LOOKUP 1956extern void *ipf_resolvelookup __P((int, u_int, u_int, 1957 lookupfunc_t *)); 1958#endif 1959extern u_32_t ipf_random __P((void)); 1960 1961extern int ipf_main_load __P((void)); 1962extern void *ipf_main_soft_create __P((void *)); 1963extern void ipf_main_soft_destroy __P((ipf_main_softc_t *)); 1964extern int ipf_main_soft_init __P((ipf_main_softc_t *)); 1965extern int ipf_main_soft_fini __P((ipf_main_softc_t *)); 1966extern int ipf_main_unload __P((void)); 1967extern int ipf_load_all __P((void)); 1968extern int ipf_unload_all __P((void)); 1969extern void ipf_destroy_all __P((ipf_main_softc_t *)); 1970extern ipf_main_softc_t *ipf_create_all __P((void *)); 1971extern int ipf_init_all __P((ipf_main_softc_t *)); 1972extern int ipf_fini_all __P((ipf_main_softc_t *)); 1973extern void ipf_log_soft_destroy __P((ipf_main_softc_t *, void *)); 1974extern void *ipf_log_soft_create __P((ipf_main_softc_t *)); 1975extern int ipf_log_soft_init __P((ipf_main_softc_t *, void *)); 1976extern int ipf_log_soft_fini __P((ipf_main_softc_t *, void *)); 1977extern int ipf_log_main_load __P((void)); 1978extern int ipf_log_main_unload __P((void)); 1979 1980 1981extern char ipfilter_version[]; 1982#ifdef USE_INET6 1983extern int icmptoicmp6types[ICMP_MAXTYPE+1]; 1984extern int icmptoicmp6unreach[ICMP_MAX_UNREACH]; 1985extern int icmpreplytype6[ICMP6_MAXTYPE + 1]; 1986#endif 1987#ifdef IPFILTER_COMPAT 1988extern int ipf_in_compat __P((ipf_main_softc_t *, ipfobj_t *, void *,int)); 1989extern int ipf_out_compat __P((ipf_main_softc_t *, ipfobj_t *, void *)); 1990#endif 1991extern int icmpreplytype4[ICMP_MAXTYPE + 1]; 1992 1993extern int ipf_ht_node_add __P((ipf_main_softc_t *, host_track_t *, 1994 int, i6addr_t *)); 1995extern int ipf_ht_node_del __P((host_track_t *, int, i6addr_t *)); 1996extern void ipf_rb_ht_flush __P((host_track_t *)); 1997extern void ipf_rb_ht_freenode __P((host_node_t *, void *)); 1998extern void ipf_rb_ht_init __P((host_track_t *)); 1999 2000#endif /* __IP_FIL_H__ */ 2001