ip_fil.h revision 153876
1/*
2 * Copyright (C) 1993-2001, 2003 by Darren Reed.
3 *
4 * See the IPFILTER.LICENCE file for details on licencing.
5 *
6 * @(#)ip_fil.h	1.35 6/5/96
7 * $FreeBSD: head/sys/contrib/ipfilter/netinet/ip_fil.h 153876 2005-12-30 11:32:23Z guido $
8 * Id: ip_fil.h,v 2.170.2.18 2005/03/28 10:47:52 darrenr Exp
9 */
10
11#ifndef	__IP_FIL_H__
12#define	__IP_FIL_H__
13
14#include "netinet/ip_compat.h"
15
16#ifndef	SOLARIS
17# define SOLARIS (defined(sun) && (defined(__svr4__) || defined(__SVR4)))
18#endif
19
20#ifndef	__P
21# ifdef	__STDC__
22#  define	__P(x)	x
23# else
24#  define	__P(x)	()
25# endif
26#endif
27
28#if defined(__STDC__) || defined(__GNUC__) || defined(_AIX51)
29# define	SIOCADAFR	_IOW('r', 60, struct ipfobj)
30# define	SIOCRMAFR	_IOW('r', 61, struct ipfobj)
31# define	SIOCSETFF	_IOW('r', 62, u_int)
32# define	SIOCGETFF	_IOR('r', 63, u_int)
33# define	SIOCGETFS	_IOWR('r', 64, struct ipfobj)
34# define	SIOCIPFFL	_IOWR('r', 65, int)
35# define	SIOCIPFFB	_IOR('r', 66, int)
36# define	SIOCADIFR	_IOW('r', 67, struct ipfobj)
37# define	SIOCRMIFR	_IOW('r', 68, struct ipfobj)
38# define	SIOCSWAPA	_IOR('r', 69, u_int)
39# define	SIOCINAFR	_IOW('r', 70, struct ipfobj)
40# define	SIOCINIFR	_IOW('r', 71, struct ipfobj)
41# define	SIOCFRENB	_IOW('r', 72, u_int)
42# define	SIOCFRSYN	_IOW('r', 73, u_int)
43# define	SIOCFRZST	_IOWR('r', 74, struct ipfobj)
44# define	SIOCZRLST	_IOWR('r', 75, struct ipfobj)
45# define	SIOCAUTHW	_IOWR('r', 76, struct ipfobj)
46# define	SIOCAUTHR	_IOWR('r', 77, struct ipfobj)
47# define	SIOCATHST	_IOWR('r', 78, struct ipfobj)
48# define	SIOCSTLCK	_IOWR('r', 79, u_int)
49# define	SIOCSTPUT	_IOWR('r', 80, struct ipfobj)
50# define	SIOCSTGET	_IOWR('r', 81, struct ipfobj)
51# define	SIOCSTGSZ	_IOWR('r', 82, struct ipfobj)
52# define	SIOCGFRST	_IOWR('r', 83, struct ipfobj)
53# define	SIOCSETLG	_IOWR('r', 84, int)
54# define	SIOCGETLG	_IOWR('r', 85, int)
55# define	SIOCFUNCL	_IOWR('r', 86, struct ipfunc_resolve)
56# define	SIOCIPFGETNEXT	_IOWR('r', 87, struct ipfobj)
57# define	SIOCIPFGET	_IOWR('r', 88, struct ipfobj)
58# define	SIOCIPFSET	_IOWR('r', 89, struct ipfobj)
59# define	SIOCIPFL6	_IOWR('r', 90, int)
60#else
61# define	SIOCADAFR	_IOW(r, 60, struct ipfobj)
62# define	SIOCRMAFR	_IOW(r, 61, struct ipfobj)
63# define	SIOCSETFF	_IOW(r, 62, u_int)
64# define	SIOCGETFF	_IOR(r, 63, u_int)
65# define	SIOCGETFS	_IOWR(r, 64, struct ipfobj)
66# define	SIOCIPFFL	_IOWR(r, 65, int)
67# define	SIOCIPFFB	_IOR(r, 66, int)
68# define	SIOCADIFR	_IOW(r, 67, struct ipfobj)
69# define	SIOCRMIFR	_IOW(r, 68, struct ipfobj)
70# define	SIOCSWAPA	_IOR(r, 69, u_int)
71# define	SIOCINAFR	_IOW(r, 70, struct ipfobj)
72# define	SIOCINIFR	_IOW(r, 71, struct ipfobj)
73# define	SIOCFRENB	_IOW(r, 72, u_int)
74# define	SIOCFRSYN	_IOW(r, 73, u_int)
75# define	SIOCFRZST	_IOWR(r, 74, struct ipfobj)
76# define	SIOCZRLST	_IOWR(r, 75, struct ipfobj)
77# define	SIOCAUTHW	_IOWR(r, 76, struct ipfobj)
78# define	SIOCAUTHR	_IOWR(r, 77, struct ipfobj)
79# define	SIOCATHST	_IOWR(r, 78, struct ipfobj)
80# define	SIOCSTLCK	_IOWR(r, 79, u_int)
81# define	SIOCSTPUT	_IOWR(r, 80, struct ipfobj)
82# define	SIOCSTGET	_IOWR(r, 81, struct ipfobj)
83# define	SIOCSTGSZ	_IOWR(r, 82, struct ipfobj)
84# define	SIOCGFRST	_IOWR(r, 83, struct ipfobj)
85# define	SIOCSETLG	_IOWR(r, 84, int)
86# define	SIOCGETLG	_IOWR(r, 85, int)
87# define	SIOCFUNCL	_IOWR(r, 86, struct ipfunc_resolve)
88# define	SIOCIPFGETNEXT	_IOWR(r, 87, struct ipfobj)
89# define	SIOCIPFGET	_IOWR(r, 88, struct ipfobj)
90# define	SIOCIPFSET	_IOWR(r, 89, struct ipfobj)
91# define	SIOCIPFL6	_IOWR(r, 90, int)
92#endif
93#define	SIOCADDFR	SIOCADAFR
94#define	SIOCDELFR	SIOCRMAFR
95#define	SIOCINSFR	SIOCINAFR
96
97
98struct ipscan;
99struct ifnet;
100
101
102typedef	int	(* lookupfunc_t) __P((void *, int, void *));
103
104/*
105 * i6addr is used as a container for both IPv4 and IPv6 addresses, as well
106 * as other types of objects, depending on its qualifier.
107 */
108#ifdef	USE_INET6
109typedef	union	i6addr	{
110	u_32_t	i6[4];
111	struct	in_addr	in4;
112	struct	in6_addr in6;
113	void	*vptr[2];
114	lookupfunc_t	lptr[2];
115} i6addr_t;
116#else
117typedef	union	i6addr	{
118	u_32_t	i6[4];
119	struct	in_addr	in4;
120	void	*vptr[2];
121	lookupfunc_t	lptr[2];
122} i6addr_t;
123#endif
124
125#define in4_addr	in4.s_addr
126#define	iplookupnum	i6[0]
127#define	iplookuptype	i6[1]
128/*
129 * NOTE: These DO overlap the above on 64bit systems and this IS recognised.
130 */
131#define	iplookupptr	vptr[0]
132#define	iplookupfunc	lptr[1]
133
134#define	I60(x)	(((i6addr_t *)(x))->i6[0])
135#define	I61(x)	(((i6addr_t *)(x))->i6[1])
136#define	I62(x)	(((i6addr_t *)(x))->i6[2])
137#define	I63(x)	(((i6addr_t *)(x))->i6[3])
138#define	HI60(x)	ntohl(((i6addr_t *)(x))->i6[0])
139#define	HI61(x)	ntohl(((i6addr_t *)(x))->i6[1])
140#define	HI62(x)	ntohl(((i6addr_t *)(x))->i6[2])
141#define	HI63(x)	ntohl(((i6addr_t *)(x))->i6[3])
142
143#define	IP6_EQ(a,b)	((I63(a) == I63(b)) && (I62(a) == I62(b)) && \
144			 (I61(a) == I61(b)) && (I60(a) == I60(b)))
145#define	IP6_NEQ(a,b)	((I63(a) != I63(b)) || (I62(a) != I62(b)) || \
146			 (I61(a) != I61(b)) || (I60(a) != I60(b)))
147#define IP6_ISZERO(a)   ((I60(a) | I61(a) | I62(a) | I63(a)) == 0)
148#define IP6_NOTZERO(a)  ((I60(a) | I61(a) | I62(a) | I63(a)) != 0)
149#define	IP6_GT(a,b)	(HI60(a) > HI60(b) || (HI60(a) == HI60(b) && \
150			  (HI61(a) > HI61(b) || (HI61(a) == HI61(b) && \
151			    (HI62(a) > HI62(b) || (HI62(a) == HI62(b) && \
152			      HI63(a) > HI63(b)))))))
153#define	IP6_LT(a,b)	(HI60(a) < HI60(b) || (HI60(a) == HI60(b) && \
154			  (HI61(a) < HI61(b) || (HI61(a) == HI61(b) && \
155			    (HI62(a) < HI62(b) || (HI62(a) == HI62(b) && \
156			      HI63(a) < HI63(b)))))))
157#define	NLADD(n,x)	htonl(ntohl(n) + (x))
158#define	IP6_INC(a)	\
159		{ i6addr_t *_i6 = (i6addr_t *)(a); \
160		  _i6->i6[0] = NLADD(_i6->i6[0], 1); \
161		  if (_i6->i6[0] == 0) { \
162			_i6->i6[0] = NLADD(_i6->i6[1], 1); \
163			if (_i6->i6[1] == 0) { \
164				_i6->i6[0] = NLADD(_i6->i6[2], 1); \
165				if (_i6->i6[2] == 0) { \
166					_i6->i6[0] = NLADD(_i6->i6[3], 1); \
167				} \
168			} \
169		  } \
170		}
171#define	IP6_ADD(a,x,d)	\
172		{ i6addr_t *_s = (i6addr_t *)(a); \
173		  i6addr_t *_d = (i6addr_t *)(d); \
174		  _d->i6[0] = NLADD(_s->i6[0], x); \
175		  if (ntohl(_d->i6[0]) < ntohl(_s->i6[0])) { \
176			_d->i6[1] = NLADD(_d->i6[1], 1); \
177			if (ntohl(_d->i6[1]) < ntohl(_s->i6[1])) { \
178				_d->i6[2] = NLADD(_d->i6[2], 1); \
179				if (ntohl(_d->i6[2]) < ntohl(_s->i6[2])) { \
180					_d->i6[3] = NLADD(_d->i6[3], 1); \
181				} \
182			} \
183		  } \
184		}
185#define	IP6_AND(a,b,d)	{ i6addr_t *_s1 = (i6addr_t *)(a); \
186			  i6addr_t *_s2 = (i6addr_t *)(d); \
187			  i6addr_t *_d = (i6addr_t *)(d); \
188			  _d->i6[0] = _s1->i6[0] & _s2->i6[0]; \
189			  _d->i6[1] = _s1->i6[1] & _s2->i6[1]; \
190			  _d->i6[2] = _s1->i6[2] & _s2->i6[2]; \
191			  _d->i6[3] = _s1->i6[3] & _s2->i6[3]; \
192			}
193#define	IP6_MERGE(a,b,c) \
194			{ i6addr_t *_d, *_s1, *_s2; \
195			  _d = (i6addr_t *)(a); \
196			  _s1 = (i6addr_t *)(b); \
197			  _s2 = (i6addr_t *)(c); \
198			  _d->i6[0] |= _s1->i6[0] & ~_s2->i6[0]; \
199			  _d->i6[1] |= _s1->i6[1] & ~_s2->i6[1]; \
200			  _d->i6[2] |= _s1->i6[2] & ~_s2->i6[2]; \
201			  _d->i6[2] |= _s1->i6[3] & ~_s2->i6[3]; \
202			}
203
204
205typedef	struct	fr_ip	{
206	u_32_t	fi_v:4;		/* IP version */
207	u_32_t	fi_xx:4;	/* spare */
208	u_32_t	fi_tos:8;	/* IP packet TOS */
209	u_32_t	fi_ttl:8;	/* IP packet TTL */
210	u_32_t	fi_p:8;		/* IP packet protocol */
211	u_32_t	fi_optmsk;	/* bitmask composed from IP options */
212	i6addr_t fi_src;	/* source address from packet */
213	i6addr_t fi_dst;	/* destination address from packet */
214	u_short	fi_secmsk;	/* bitmask composed from IP security options */
215	u_short	fi_auth;	/* authentication code from IP sec. options */
216	u_32_t	fi_flx;		/* packet flags */
217	u_32_t	fi_tcpmsk;	/* TCP options set/reset */
218	u_32_t	fi_res1;	/* RESERVED */
219} fr_ip_t;
220
221/*
222 * For use in fi_flx
223 */
224#define	FI_TCPUDP	0x0001	/* TCP/UCP implied comparison*/
225#define	FI_OPTIONS	0x0002
226#define	FI_FRAG		0x0004
227#define	FI_SHORT	0x0008
228#define	FI_NATED	0x0010
229#define	FI_MULTICAST	0x0020
230#define	FI_BROADCAST	0x0040
231#define	FI_MBCAST	0x0080
232#define	FI_STATE	0x0100
233#define	FI_BADNAT	0x0200
234#define	FI_BAD		0x0400
235#define	FI_OOW		0x0800	/* Out of state window, else match */
236#define	FI_ICMPERR	0x1000
237#define	FI_FRAGBODY	0x2000
238#define	FI_BADSRC	0x4000
239#define	FI_LOWTTL	0x8000
240#define	FI_CMP		0xcfe3	/* Not FI_FRAG,FI_NATED,FI_FRAGTAIL */
241#define	FI_ICMPCMP	0x0003	/* Flags we can check for ICMP error packets */
242#define	FI_WITH		0xeffe	/* Not FI_TCPUDP */
243#define	FI_V6EXTHDR	0x10000
244#define	FI_COALESCE	0x20000
245#define	FI_NOCKSUM	0x20000000	/* don't do a L4 checksum validation */
246#define	FI_DONTCACHE	0x40000000	/* don't cache the result */
247#define	FI_IGNORE	0x80000000
248
249#define	fi_saddr	fi_src.in4.s_addr
250#define	fi_daddr	fi_dst.in4.s_addr
251#define	fi_srcnum	fi_src.iplookupnum
252#define	fi_dstnum	fi_dst.iplookupnum
253#define	fi_srctype	fi_src.iplookuptype
254#define	fi_dsttype	fi_dst.iplookuptype
255#define	fi_srcptr	fi_src.iplookupptr
256#define	fi_dstptr	fi_dst.iplookupptr
257#define	fi_srcfunc	fi_src.iplookupfunc
258#define	fi_dstfunc	fi_dst.iplookupfunc
259
260
261/*
262 * These are both used by the state and NAT code to indicate that one port or
263 * the other should be treated as a wildcard.
264 * NOTE: When updating, check bit masks in ip_state.h and update there too.
265 */
266#define	SI_W_SPORT	0x00000100
267#define	SI_W_DPORT	0x00000200
268#define	SI_WILDP	(SI_W_SPORT|SI_W_DPORT)
269#define	SI_W_SADDR	0x00000400
270#define	SI_W_DADDR	0x00000800
271#define	SI_WILDA	(SI_W_SADDR|SI_W_DADDR)
272#define	SI_NEWFR	0x00001000
273#define	SI_CLONE	0x00002000
274#define	SI_CLONED	0x00004000
275
276
277typedef	struct	fr_info	{
278	void	*fin_ifp;		/* interface packet is `on' */
279	fr_ip_t	fin_fi;		/* IP Packet summary */
280	union	{
281		u_short	fid_16[2];	/* TCP/UDP ports, ICMP code/type */
282		u_32_t	fid_32;
283	} fin_dat;
284	int	fin_out;		/* in or out ? 1 == out, 0 == in */
285	int	fin_rev;		/* state only: 1 = reverse */
286	u_short	fin_hlen;		/* length of IP header in bytes */
287	u_char	fin_tcpf;		/* TCP header flags (SYN, ACK, etc) */
288	u_char	fin_icode;		/* ICMP error to return */
289	u_32_t	fin_rule;		/* rule # last matched */
290	char	fin_group[FR_GROUPLEN];	/* group number, -1 for none */
291	struct	frentry *fin_fr;	/* last matching rule */
292	void	*fin_dp;		/* start of data past IP header */
293	int	fin_dlen;		/* length of data portion of packet */
294	int	fin_plen;
295	int	fin_ipoff;		/* # bytes from buffer start to hdr */
296	u_short	fin_id;			/* IP packet id field */
297	u_short	fin_off;
298	int	fin_depth;		/* Group nesting depth */
299	int	fin_error;		/* Error code to return */
300	void	*fin_nat;
301	void	*fin_state;
302	void	*fin_nattag;
303	ip_t	*fin_ip;
304	mb_t	**fin_mp;		/* pointer to pointer to mbuf */
305	mb_t	*fin_m;			/* pointer to mbuf */
306#ifdef	MENTAT
307	mb_t	*fin_qfm;		/* pointer to mblk where pkt starts */
308	void	*fin_qpi;
309#endif
310#ifdef	__sgi
311	void	*fin_hbuf;
312#endif
313} fr_info_t;
314
315#define	fin_v		fin_fi.fi_v
316#define	fin_p		fin_fi.fi_p
317#define	fin_flx		fin_fi.fi_flx
318#define	fin_optmsk	fin_fi.fi_optmsk
319#define	fin_secmsk	fin_fi.fi_secmsk
320#define	fin_auth	fin_fi.fi_auth
321#define	fin_src		fin_fi.fi_src.in4
322#define	fin_src6	fin_fi.fi_src.in6
323#define	fin_saddr	fin_fi.fi_saddr
324#define	fin_dst		fin_fi.fi_dst.in4
325#define	fin_dst6	fin_fi.fi_dst.in6
326#define	fin_daddr	fin_fi.fi_daddr
327#define	fin_data	fin_dat.fid_16
328#define	fin_sport	fin_dat.fid_16[0]
329#define	fin_dport	fin_dat.fid_16[1]
330#define	fin_ports	fin_dat.fid_32
331
332#define	IPF_IN	0
333#define	IPF_OUT	1
334
335typedef	struct frentry	*(*ipfunc_t) __P((fr_info_t *, u_32_t *));
336typedef	int		(*ipfuncinit_t) __P((struct frentry *));
337
338typedef	struct	ipfunc_resolve	{
339	char		ipfu_name[32];
340	ipfunc_t	ipfu_addr;
341	ipfuncinit_t	ipfu_init;
342} ipfunc_resolve_t;
343
344/*
345 * Size for compares on fr_info structures
346 */
347#define	FI_CSIZE	offsetof(fr_info_t, fin_icode)
348#define	FI_LCSIZE	offsetof(fr_info_t, fin_dp)
349
350/*
351 * Size for copying cache fr_info structure
352 */
353#define	FI_COPYSIZE	offsetof(fr_info_t, fin_dp)
354
355/*
356 * Structure for holding IPFilter's tag information
357 */
358#define	IPFTAG_LEN	16
359typedef	struct	{
360	union	{
361		u_32_t	iptu_num[4];
362		char	iptu_tag[IPFTAG_LEN];
363	} ipt_un;
364	int	ipt_not;
365} ipftag_t;
366
367#define	ipt_tag	ipt_un.iptu_tag
368#define	ipt_num	ipt_un.iptu_num
369
370
371/*
372 * This structure is used to hold information about the next hop for where
373 * to forward a packet.
374 */
375typedef	struct	frdest	{
376	void	*fd_ifp;
377	i6addr_t	fd_ip6;
378	char	fd_ifname[LIFNAMSIZ];
379} frdest_t;
380
381#define	fd_ip	fd_ip6.in4
382
383
384/*
385 * This structure holds information about a port comparison.
386 */
387typedef	struct	frpcmp	{
388	int	frp_cmp;	/* data for port comparisons */
389	u_short	frp_port;	/* top port for <> and >< */
390	u_short	frp_top;	/* top port for <> and >< */
391} frpcmp_t;
392
393#define FR_NONE 0
394#define FR_EQUAL 1
395#define FR_NEQUAL 2
396#define FR_LESST 3
397#define FR_GREATERT 4
398#define FR_LESSTE 5
399#define FR_GREATERTE 6
400#define FR_OUTRANGE 7
401#define FR_INRANGE 8
402#define FR_INCRANGE 9
403
404/*
405 * Structure containing all the relevant TCP things that can be checked in
406 * a filter rule.
407 */
408typedef	struct	frtuc	{
409	u_char		ftu_tcpfm;	/* tcp flags mask */
410	u_char		ftu_tcpf;	/* tcp flags */
411	frpcmp_t	ftu_src;
412	frpcmp_t	ftu_dst;
413} frtuc_t;
414
415#define	ftu_scmp	ftu_src.frp_cmp
416#define	ftu_dcmp	ftu_dst.frp_cmp
417#define	ftu_sport	ftu_src.frp_port
418#define	ftu_dport	ftu_dst.frp_port
419#define	ftu_stop	ftu_src.frp_top
420#define	ftu_dtop	ftu_dst.frp_top
421
422#define	FR_TCPFMAX	0x3f
423
424/*
425 * This structure makes up what is considered to be the IPFilter specific
426 * matching components of a filter rule, as opposed to the data structures
427 * used to define the result which are in frentry_t and not here.
428 */
429typedef	struct	fripf	{
430	fr_ip_t	fri_ip;
431	fr_ip_t	fri_mip;	/* mask structure */
432
433	u_short	fri_icmpm;		/* data for ICMP packets (mask) */
434	u_short	fri_icmp;
435
436	frtuc_t	fri_tuc;
437	int	fri_satype;		/* addres type */
438	int	fri_datype;		/* addres type */
439	int	fri_sifpidx;		/* doing dynamic addressing */
440	int	fri_difpidx;		/* index into fr_ifps[] to use when */
441} fripf_t;
442
443#define	fri_dstnum	fri_ip.fi_dstnum
444#define	fri_srcnum	fri_mip.fi_srcnum
445#define	fri_dstptr	fri_ip.fi_dstptr
446#define	fri_srcptr	fri_mip.fi_srcptr
447
448#define	FRI_NORMAL	0	/* Normal address */
449#define	FRI_DYNAMIC	1	/* dynamic address */
450#define	FRI_LOOKUP	2	/* address is a pool # */
451#define	FRI_RANGE	3	/* address/mask is a range */
452#define	FRI_NETWORK	4	/* network address from if */
453#define	FRI_BROADCAST	5	/* broadcast address from if */
454#define	FRI_PEERADDR	6	/* Peer address for P-to-P */
455#define	FRI_NETMASKED	7	/* network address with netmask from if */
456
457
458typedef	struct	frentry	* (* frentfunc_t) __P((fr_info_t *));
459
460typedef	struct	frentry {
461	ipfmutex_t	fr_lock;
462	struct	frentry	*fr_next;
463	struct	frentry	**fr_grp;
464	struct	ipscan	*fr_isc;
465	void	*fr_ifas[4];
466	void	*fr_ptr;	/* for use with fr_arg */
467	char	*fr_comment;	/* text comment for rule */
468	int	fr_ref;		/* reference count - for grouping */
469	int	fr_statecnt;	/* state count - for limit rules */
470	/*
471	 * These are only incremented when a packet  matches this rule and
472	 * it is the last match
473	 */
474	U_QUAD_T	fr_hits;
475	U_QUAD_T	fr_bytes;
476
477	/*
478	 * For PPS rate limiting
479	 */
480	struct timeval	fr_lastpkt;
481	int		fr_curpps;
482
483	union	{
484		void		*fru_data;
485		caddr_t		fru_caddr;
486		fripf_t		*fru_ipf;
487		frentfunc_t	fru_func;
488	} fr_dun;
489
490	/*
491	 * Fields after this may not change whilst in the kernel.
492	 */
493	ipfunc_t fr_func; 	/* call this function */
494	int	fr_dsize;
495	int	fr_pps;
496	int	fr_statemax;	/* max reference count */
497	int	fr_flineno;	/* line number from conf file */
498	u_32_t	fr_type;
499	u_32_t	fr_flags;	/* per-rule flags && options (see below) */
500	u_32_t	fr_logtag;	/* user defined log tag # */
501	u_32_t	fr_collect;	/* collection number */
502	u_int	fr_arg;		/* misc. numeric arg for rule */
503	u_int	fr_loglevel;	/* syslog log facility + priority */
504	u_int	fr_age[2];	/* non-TCP timeouts */
505	u_char	fr_v;
506	u_char	fr_icode;	/* return ICMP code */
507	char	fr_group[FR_GROUPLEN];	/* group to which this rule belongs */
508	char	fr_grhead[FR_GROUPLEN];	/* group # which this rule starts */
509	ipftag_t fr_nattag;
510	char	fr_ifnames[4][LIFNAMSIZ];
511	char	fr_isctag[16];
512	frdest_t fr_tifs[2];	/* "to"/"reply-to" interface */
513	frdest_t fr_dif;	/* duplicate packet interface */
514	/*
515	 * This must be last and will change after loaded into the kernel.
516	 */
517	u_int	fr_cksum;	/* checksum on filter rules for performance */
518} frentry_t;
519
520#define	fr_caddr	fr_dun.fru_caddr
521#define	fr_data		fr_dun.fru_data
522#define	fr_dfunc	fr_dun.fru_func
523#define	fr_ipf		fr_dun.fru_ipf
524#define	fr_ip		fr_ipf->fri_ip
525#define	fr_mip		fr_ipf->fri_mip
526#define	fr_icmpm	fr_ipf->fri_icmpm
527#define	fr_icmp		fr_ipf->fri_icmp
528#define	fr_tuc		fr_ipf->fri_tuc
529#define	fr_satype	fr_ipf->fri_satype
530#define	fr_datype	fr_ipf->fri_datype
531#define	fr_sifpidx	fr_ipf->fri_sifpidx
532#define	fr_difpidx	fr_ipf->fri_difpidx
533#define	fr_proto	fr_ip.fi_p
534#define	fr_mproto	fr_mip.fi_p
535#define	fr_ttl		fr_ip.fi_ttl
536#define	fr_mttl		fr_mip.fi_ttl
537#define	fr_tos		fr_ip.fi_tos
538#define	fr_mtos		fr_mip.fi_tos
539#define	fr_tcpfm	fr_tuc.ftu_tcpfm
540#define	fr_tcpf		fr_tuc.ftu_tcpf
541#define	fr_scmp		fr_tuc.ftu_scmp
542#define	fr_dcmp		fr_tuc.ftu_dcmp
543#define	fr_dport	fr_tuc.ftu_dport
544#define	fr_sport	fr_tuc.ftu_sport
545#define	fr_stop		fr_tuc.ftu_stop
546#define	fr_dtop		fr_tuc.ftu_dtop
547#define	fr_dst		fr_ip.fi_dst.in4
548#define	fr_daddr	fr_ip.fi_dst.in4.s_addr
549#define	fr_src		fr_ip.fi_src.in4
550#define	fr_saddr	fr_ip.fi_src.in4.s_addr
551#define	fr_dmsk		fr_mip.fi_dst.in4
552#define	fr_dmask	fr_mip.fi_dst.in4.s_addr
553#define	fr_smsk		fr_mip.fi_src.in4
554#define	fr_smask	fr_mip.fi_src.in4.s_addr
555#define	fr_dstnum	fr_ip.fi_dstnum
556#define	fr_srcnum	fr_ip.fi_srcnum
557#define	fr_dsttype	fr_ip.fi_dsttype
558#define	fr_srctype	fr_ip.fi_srctype
559#define	fr_dstptr	fr_mip.fi_dstptr
560#define	fr_srcptr	fr_mip.fi_srcptr
561#define	fr_dstfunc	fr_mip.fi_dstfunc
562#define	fr_srcfunc	fr_mip.fi_srcfunc
563#define	fr_optbits	fr_ip.fi_optmsk
564#define	fr_optmask	fr_mip.fi_optmsk
565#define	fr_secbits	fr_ip.fi_secmsk
566#define	fr_secmask	fr_mip.fi_secmsk
567#define	fr_authbits	fr_ip.fi_auth
568#define	fr_authmask	fr_mip.fi_auth
569#define	fr_flx		fr_ip.fi_flx
570#define	fr_mflx		fr_mip.fi_flx
571#define	fr_ifname	fr_ifnames[0]
572#define	fr_oifname	fr_ifnames[2]
573#define	fr_ifa		fr_ifas[0]
574#define	fr_oifa		fr_ifas[2]
575#define	fr_tif		fr_tifs[0]
576#define	fr_rif		fr_tifs[1]
577
578#define	FR_NOLOGTAG	0
579
580#ifndef	offsetof
581#define	offsetof(t,m)	(int)((&((t *)0L)->m))
582#endif
583#define	FR_CMPSIZ	(sizeof(struct frentry) - \
584			 offsetof(struct frentry, fr_func))
585
586/*
587 * fr_type
588 */
589#define	FR_T_NONE	0
590#define	FR_T_IPF	1	/* IPF structures */
591#define	FR_T_BPFOPC	2	/* BPF opcode */
592#define	FR_T_CALLFUNC	3	/* callout to function in fr_func only */
593#define	FR_T_COMPIPF	4	/* compiled C code */
594#define	FR_T_BUILTIN	0x80000000	/* rule is in kernel space */
595
596/*
597 * fr_flags
598 */
599#define	FR_CALL		0x00000	/* call rule */
600#define	FR_BLOCK	0x00001	/* do not allow packet to pass */
601#define	FR_PASS		0x00002	/* allow packet to pass */
602#define	FR_AUTH		0x00003	/* use authentication */
603#define	FR_PREAUTH	0x00004	/* require preauthentication */
604#define	FR_ACCOUNT	0x00005	/* Accounting rule */
605#define	FR_SKIP		0x00006	/* skip rule */
606#define	FR_DIVERT	0x00007	/* divert rule */
607#define	FR_CMDMASK	0x0000f
608#define	FR_LOG		0x00010	/* Log */
609#define	FR_LOGB		0x00011	/* Log-fail */
610#define	FR_LOGP		0x00012	/* Log-pass */
611#define	FR_LOGMASK	(FR_LOG|FR_CMDMASK)
612#define	FR_CALLNOW	0x00020	/* call another function (fr_func) if matches */
613#define	FR_NOTSRCIP	0x00040
614#define	FR_NOTDSTIP	0x00080
615#define	FR_QUICK	0x00100	/* match & stop processing list */
616#define	FR_KEEPFRAG	0x00200	/* keep fragment information */
617#define	FR_KEEPSTATE	0x00400	/* keep `connection' state information */
618#define	FR_FASTROUTE	0x00800	/* bypass normal routing */
619#define	FR_RETRST	0x01000	/* Return TCP RST packet - reset connection */
620#define	FR_RETICMP	0x02000	/* Return ICMP unreachable packet */
621#define	FR_FAKEICMP	0x03000	/* Return ICMP unreachable with fake source */
622#define	FR_OUTQUE	0x04000	/* outgoing packets */
623#define	FR_INQUE	0x08000	/* ingoing packets */
624#define	FR_LOGBODY	0x10000	/* Log the body */
625#define	FR_LOGFIRST	0x20000	/* Log the first byte if state held */
626#define	FR_LOGORBLOCK	0x40000	/* block the packet if it can't be logged */
627#define	FR_DUP		0x80000	/* duplicate packet */
628#define	FR_FRSTRICT	0x100000	/* strict frag. cache */
629#define	FR_STSTRICT	0x200000	/* strict keep state */
630#define	FR_NEWISN	0x400000	/* new ISN for outgoing TCP */
631#define	FR_NOICMPERR	0x800000	/* do not match ICMP errors in state */
632#define	FR_STATESYNC	0x1000000	/* synchronize state to slave */
633#define	FR_NOMATCH	0x8000000	/* no match occured */
634		/*	0x10000000 	FF_LOGPASS */
635		/*	0x20000000 	FF_LOGBLOCK */
636		/*	0x40000000 	FF_LOGNOMATCH */
637		/*	0x80000000 	FF_BLOCKNONIP */
638#define	FR_COPIED	0x40000000	/* copied from user space */
639#define	FR_INACTIVE	0x80000000	/* only used when flush'ing rules */
640
641#define	FR_RETMASK	(FR_RETICMP|FR_RETRST|FR_FAKEICMP)
642#define	FR_ISBLOCK(x)	(((x) & FR_CMDMASK) == FR_BLOCK)
643#define	FR_ISPASS(x)	(((x) & FR_CMDMASK) == FR_PASS)
644#define	FR_ISAUTH(x)	(((x) & FR_CMDMASK) == FR_AUTH)
645#define	FR_ISPREAUTH(x)	(((x) & FR_CMDMASK) == FR_PREAUTH)
646#define	FR_ISACCOUNT(x)	(((x) & FR_CMDMASK) == FR_ACCOUNT)
647#define	FR_ISSKIP(x)	(((x) & FR_CMDMASK) == FR_SKIP)
648#define	FR_ISNOMATCH(x)	((x) & FR_NOMATCH)
649#define	FR_INOUT	(FR_INQUE|FR_OUTQUE)
650
651/*
652 * recognized flags for SIOCGETFF and SIOCSETFF, and get put in fr_flags
653 */
654#define	FF_LOGPASS	0x10000000
655#define	FF_LOGBLOCK	0x20000000
656#define	FF_LOGNOMATCH	0x40000000
657#define	FF_LOGGING	(FF_LOGPASS|FF_LOGBLOCK|FF_LOGNOMATCH)
658#define	FF_BLOCKNONIP	0x80000000	/* Solaris2 Only */
659
660
661/*
662 * Structure that passes information on what/how to flush to the kernel.
663 */
664typedef	struct	ipfflush	{
665	int	ipflu_how;
666	int	ipflu_arg;
667} ipfflush_t;
668
669
670/*
671 *
672 */
673typedef	struct	ipfgetctl	{
674	u_int	ipfg_min;	/* min value */
675	u_int	ipfg_current;	/* current value */
676	u_int	ipfg_max;	/* max value */
677	u_int	ipfg_default;	/* default value */
678	u_int	ipfg_steps;	/* value increments */
679	char	ipfg_name[40];	/* tag name for this control */
680} ipfgetctl_t;
681
682typedef	struct	ipfsetctl	{
683	int	ipfs_which;	/* 0 = min 1 = current 2 = max 3 = default */
684	u_int	ipfs_value;	/* min value */
685	char	ipfs_name[40];	/* tag name for this control */
686} ipfsetctl_t;
687
688
689/*
690 * Some of the statistics below are in their own counters, but most are kept
691 * in this single structure so that they can all easily be collected and
692 * copied back as required.
693 */
694typedef	struct	filterstats {
695	u_long	fr_pass;	/* packets allowed */
696	u_long	fr_block;	/* packets denied */
697	u_long	fr_nom;		/* packets which don't match any rule */
698	u_long	fr_short;	/* packets which are short */
699	u_long	fr_ppkl;	/* packets allowed and logged */
700	u_long	fr_bpkl;	/* packets denied and logged */
701	u_long	fr_npkl;	/* packets unmatched and logged */
702	u_long	fr_pkl;		/* packets logged */
703	u_long	fr_skip;	/* packets to be logged but buffer full */
704	u_long	fr_ret;		/* packets for which a return is sent */
705	u_long	fr_acct;	/* packets for which counting was performed */
706	u_long	fr_bnfr;	/* bad attempts to allocate fragment state */
707	u_long	fr_nfr;		/* new fragment state kept */
708	u_long	fr_cfr;		/* add new fragment state but complete pkt */
709	u_long	fr_bads;	/* bad attempts to allocate packet state */
710	u_long	fr_ads;		/* new packet state kept */
711	u_long	fr_chit;	/* cached hit */
712	u_long	fr_tcpbad;	/* TCP checksum check failures */
713	u_long	fr_pull[2];	/* good and bad pullup attempts */
714	u_long	fr_badsrc;	/* source received doesn't match route */
715	u_long	fr_badttl;	/* TTL in packet doesn't reach minimum */
716	u_long	fr_bad;		/* bad IP packets to the filter */
717	u_long	fr_ipv6;	/* IPv6 packets in/out */
718	u_long	fr_ppshit;	/* dropped because of pps ceiling */
719	u_long	fr_ipud;	/* IP id update failures */
720} filterstats_t;
721
722/*
723 * Log structure.  Each packet header logged is prepended by one of these.
724 * Following this in the log records read from the device will be an ipflog
725 * structure which is then followed by any packet data.
726 */
727typedef	struct	iplog	{
728	u_32_t		ipl_magic;
729	u_int		ipl_count;
730	struct	timeval	ipl_time;
731	size_t		ipl_dsize;
732	struct	iplog	*ipl_next;
733} iplog_t;
734
735#define	ipl_sec		ipl_time.tv_sec
736#define	ipl_usec	ipl_time.tv_usec
737
738#define IPL_MAGIC	0x49504c4d	/* 'IPLM' */
739#define IPL_MAGIC_NAT	0x49504c4e	/* 'IPLN' */
740#define IPL_MAGIC_STATE	0x49504c53	/* 'IPLS' */
741#define	IPLOG_SIZE	sizeof(iplog_t)
742
743typedef	struct	ipflog	{
744#if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199603)) || \
745        (defined(OpenBSD) && (OpenBSD >= 199603))
746#else
747	u_int	fl_unit;
748#endif
749	u_32_t	fl_rule;
750	u_32_t	fl_flags;
751	u_32_t	fl_lflags;
752	u_32_t	fl_logtag;
753	ipftag_t	fl_nattag;
754	u_short	fl_plen;	/* extra data after hlen */
755	u_short	fl_loglevel;	/* syslog log level */
756	char	fl_group[FR_GROUPLEN];
757	u_char	fl_hlen;	/* length of IP headers saved */
758	u_char	fl_dir;
759	u_char	fl_xxx[2];	/* pad */
760	char	fl_ifname[LIFNAMSIZ];
761} ipflog_t;
762
763#ifndef	IPF_LOGGING
764# define	IPF_LOGGING	0
765#endif
766#ifndef	IPF_DEFAULT_PASS
767# define	IPF_DEFAULT_PASS	FR_PASS
768#endif
769
770#define	DEFAULT_IPFLOGSIZE	8192
771#ifndef	IPFILTER_LOGSIZE
772# define	IPFILTER_LOGSIZE	DEFAULT_IPFLOGSIZE
773#else
774# if IPFILTER_LOGSIZE < DEFAULT_IPFLOGSIZE
775#  error IPFILTER_LOGSIZE too small.  Must be >= DEFAULT_IPFLOGSIZE
776# endif
777#endif
778
779#define	IPF_OPTCOPY	0x07ff00	/* bit mask of copied options */
780
781/*
782 * Device filenames for reading log information.  Use ipf on Solaris2 because
783 * ipl is already a name used by something else.
784 */
785#ifndef	IPL_NAME
786# if	SOLARIS
787#  define	IPL_NAME	"/dev/ipf"
788# else
789#  define	IPL_NAME	"/dev/ipl"
790# endif
791#endif
792/*
793 * Pathnames for various IP Filter control devices.  Used by LKM
794 * and userland, so defined here.
795 */
796#define	IPNAT_NAME	"/dev/ipnat"
797#define	IPSTATE_NAME	"/dev/ipstate"
798#define	IPAUTH_NAME	"/dev/ipauth"
799#define	IPSYNC_NAME	"/dev/ipsync"
800#define	IPSCAN_NAME	"/dev/ipscan"
801#define	IPLOOKUP_NAME	"/dev/iplookup"
802
803#define	IPL_LOGIPF	0	/* Minor device #'s for accessing logs */
804#define	IPL_LOGNAT	1
805#define	IPL_LOGSTATE	2
806#define	IPL_LOGAUTH	3
807#define	IPL_LOGSYNC	4
808#define	IPL_LOGSCAN	5
809#define	IPL_LOGLOOKUP	6
810#define	IPL_LOGCOUNT	7
811#define	IPL_LOGMAX	7
812#define	IPL_LOGSIZE	IPL_LOGMAX + 1
813#define	IPL_LOGALL	-1
814#define	IPL_LOGNONE	-2
815
816/*
817 * For SIOCGETFS
818 */
819typedef	struct	friostat	{
820	struct	filterstats	f_st[2];
821	struct	frentry		*f_ipf[2][2];
822	struct	frentry		*f_acct[2][2];
823	struct	frentry		*f_ipf6[2][2];
824	struct	frentry		*f_acct6[2][2];
825	struct	frentry		*f_auth;
826	struct	frgroup		*f_groups[IPL_LOGSIZE][2];
827	u_long	f_froute[2];
828	u_long	f_ticks;
829	int	f_locks[IPL_LOGMAX];
830	size_t	f_kmutex_sz;
831	size_t	f_krwlock_sz;
832	int	f_defpass;	/* default pass - from fr_pass */
833	int	f_active;	/* 1 or 0 - active rule set */
834	int	f_running;	/* 1 if running, else 0 */
835	int	f_logging;	/* 1 if enabled, else 0 */
836	int	f_features;
837	char	f_version[32];	/* version string */
838} friostat_t;
839
840#define	f_fin		f_ipf[0]
841#define	f_fin6		f_ipf6[0]
842#define	f_fout		f_ipf[1]
843#define	f_fout6		f_ipf6[1]
844#define	f_acctin	f_acct[0]
845#define	f_acctin6	f_acct6[0]
846#define	f_acctout	f_acct[1]
847#define	f_acctout6	f_acct6[1]
848
849#define	IPF_FEAT_LKM		0x001
850#define	IPF_FEAT_LOG		0x002
851#define	IPF_FEAT_LOOKUP		0x004
852#define	IPF_FEAT_BPF		0x008
853#define	IPF_FEAT_COMPILED	0x010
854#define	IPF_FEAT_CKSUM		0x020
855#define	IPF_FEAT_SYNC		0x040
856#define	IPF_FEAT_SCAN		0x080
857#define	IPF_FEAT_IPV6		0x100
858
859typedef struct	optlist {
860	u_short ol_val;
861	int	ol_bit;
862} optlist_t;
863
864
865/*
866 * Group list structure.
867 */
868typedef	struct frgroup {
869	struct	frgroup	*fg_next;
870	struct	frentry	*fg_head;
871	struct	frentry	*fg_start;
872	u_32_t	fg_flags;
873	int	fg_ref;
874	char	fg_name[FR_GROUPLEN];
875} frgroup_t;
876
877#define	FG_NAME(g)	(*(g)->fg_name == '\0' ? "" : (g)->fg_name)
878
879
880/*
881 * Used by state and NAT tables
882 */
883typedef struct icmpinfo {
884	u_short	ici_id;
885	u_short	ici_seq;
886	u_char	ici_type;
887} icmpinfo_t;
888
889typedef struct udpinfo {
890	u_short	us_sport;
891	u_short	us_dport;
892} udpinfo_t;
893
894
895typedef	struct	tcpdata	{
896	u_32_t	td_end;
897	u_32_t	td_maxend;
898	u_32_t	td_maxwin;
899	u_32_t	td_winscale;
900	u_32_t	td_maxseg;
901	int	td_winflags;
902} tcpdata_t;
903
904#define	TCP_WSCALE_MAX		14
905
906#define	TCP_WSCALE_SEEN		0x00000001
907#define	TCP_WSCALE_FIRST	0x00000002
908#define	TCP_SACK_PERMIT		0x00000004
909
910
911typedef	struct tcpinfo {
912	u_short	ts_sport;
913	u_short	ts_dport;
914	tcpdata_t ts_data[2];
915} tcpinfo_t;
916
917
918/*
919 * Structures to define a GRE header as seen in a packet.
920 */
921struct	grebits	{
922	u_32_t	grb_C:1;
923	u_32_t	grb_R:1;
924	u_32_t	grb_K:1;
925	u_32_t	grb_S:1;
926	u_32_t	grb_s:1;
927	u_32_t	grb_recur:1;
928	u_32_t	grb_A:1;
929	u_32_t	grb_flags:3;
930	u_32_t	grb_ver:3;
931	u_short	grb_ptype;
932};
933
934typedef	struct	grehdr	{
935	union	{
936		struct	grebits	gru_bits;
937		u_short	gru_flags;
938	} gr_un;
939	u_short	gr_len;
940	u_short	gr_call;
941} grehdr_t;
942
943#define	gr_flags	gr_un.gru_flags
944#define	gr_bits		gr_un.gru_bits
945#define	gr_ptype	gr_bits.grb_ptype
946#define	gr_C		gr_bits.grb_C
947#define	gr_R		gr_bits.grb_R
948#define	gr_K		gr_bits.grb_K
949#define	gr_S		gr_bits.grb_S
950#define	gr_s		gr_bits.grb_s
951#define	gr_recur	gr_bits.grb_recur
952#define	gr_A		gr_bits.grb_A
953#define	gr_ver		gr_bits.grb_ver
954
955/*
956 * GRE information tracked by "keep state"
957 */
958typedef	struct	greinfo	{
959	u_short	gs_call[2];
960	u_short	gs_flags;
961	u_short	gs_ptype;
962} greinfo_t;
963
964#define	GRE_REV(x)	((ntohs(x) >> 13) & 7)
965
966
967/*
968 * Format of an Authentication header
969 */
970typedef	struct	authhdr	{
971	u_char	ah_next;
972	u_char	ah_plen;
973	u_short	ah_reserved;
974	u_32_t	ah_spi;
975	u_32_t	ah_seq;
976	/* Following the sequence number field is 0 or more bytes of */
977	/* authentication data, as specified by ah_plen - RFC 2402.  */
978} authhdr_t;
979
980
981/*
982 * Timeout tail queue list member
983 */
984typedef	struct	ipftqent	{
985	struct ipftqent **tqe_pnext;
986	struct ipftqent *tqe_next;
987	struct	ipftq	*tqe_ifq;
988	void	*tqe_parent;		/* pointer back to NAT/state struct */
989	u_long	tqe_die;		/* when this entriy is to die */
990	u_long	tqe_touched;
991	int	tqe_flags;
992	int	tqe_state[2];		/* current state of this entry */
993} ipftqent_t;
994
995#define	TQE_RULEBASED	0x00000001
996
997
998/*
999 * Timeout tail queue head for IPFilter
1000 */
1001typedef struct  ipftq   {
1002	ipfmutex_t	ifq_lock;
1003	u_int	ifq_ttl;
1004	ipftqent_t	*ifq_head;
1005	ipftqent_t	**ifq_tail;
1006	struct	ipftq	*ifq_next;
1007	struct	ipftq	**ifq_pnext;
1008	int	ifq_ref;
1009	u_int	ifq_flags;
1010} ipftq_t;
1011
1012#define	IFQF_USER	0x01		/* User defined aging */
1013#define	IFQF_DELETE	0x02		/* Marked for deletion */
1014#define	IFQF_PROXY	0x04		/* Timeout queue in use by a proxy */
1015
1016#define	IPF_HZ_MULT	1
1017#define	IPF_HZ_DIVIDE	2		/* How many times a second ipfilter */
1018					/* checks its timeout queues.       */
1019#define	IPF_TTLVAL(x)	(((x) / IPF_HZ_MULT) * IPF_HZ_DIVIDE)
1020
1021/*
1022 * Structure to define address for pool lookups.
1023 */
1024typedef	struct	{
1025	u_char		adf_len;
1026	i6addr_t	adf_addr;
1027} addrfamily_t;
1028
1029
1030/*
1031 * Object structure description.  For passing through in ioctls.
1032 */
1033typedef	struct	ipfobj	{
1034	u_32_t	ipfo_rev;		/* IPFilter version number */
1035	u_32_t	ipfo_size;		/* size of object at ipfo_ptr */
1036	void	*ipfo_ptr;		/* pointer to object */
1037	int	ipfo_type;		/* type of object being pointed to */
1038	int	ipfo_offset;		/* bytes from ipfo_ptr where to start */
1039	u_char	ipfo_xxxpad[32];	/* reserved for future use */
1040} ipfobj_t;
1041
1042#define	IPFOBJ_FRENTRY		0	/* struct frentry */
1043#define	IPFOBJ_IPFSTAT		1	/* struct friostat */
1044#define	IPFOBJ_IPFINFO		2	/* struct fr_info */
1045#define	IPFOBJ_AUTHSTAT		3	/* struct fr_authstat */
1046#define	IPFOBJ_FRAGSTAT		4	/* struct ipfrstat */
1047#define	IPFOBJ_IPNAT		5	/* struct ipnat */
1048#define	IPFOBJ_NATSTAT		6	/* struct natstat */
1049#define	IPFOBJ_STATESAVE	7	/* struct ipstate_save */
1050#define	IPFOBJ_NATSAVE		8	/* struct nat_save */
1051#define	IPFOBJ_NATLOOKUP	9	/* struct natlookup */
1052#define	IPFOBJ_IPSTATE		10	/* struct ipstate */
1053#define	IPFOBJ_STATESTAT	11	/* struct ips_stat */
1054#define	IPFOBJ_FRAUTH		12	/* struct frauth */
1055#define	IPFOBJ_TUNEABLE		13	/* struct ipftune */
1056
1057
1058typedef	union	ipftunevalptr	{
1059	void	*ipftp_void;
1060	u_long	*ipftp_long;
1061	u_int	*ipftp_int;
1062	u_short	*ipftp_short;
1063	u_char	*ipftp_char;
1064} ipftunevalptr_t;
1065
1066typedef	struct	ipftuneable	{
1067	ipftunevalptr_t	ipft_una;
1068	char		*ipft_name;
1069	u_long		ipft_min;
1070	u_long		ipft_max;
1071	int		ipft_sz;
1072	int		ipft_flags;
1073	struct ipftuneable *ipft_next;
1074} ipftuneable_t;
1075
1076#define	ipft_addr	ipft_una.ipftp_void
1077#define	ipft_plong	ipft_una.ipftp_long
1078#define	ipft_pint	ipft_una.ipftp_int
1079#define	ipft_pshort	ipft_una.ipftp_short
1080#define	ipft_pchar	ipft_una.ipftp_char
1081
1082#define	IPFT_RDONLY	1	/* read-only */
1083#define	IPFT_WRDISABLED	2	/* write when disabled only */
1084
1085typedef	union	ipftuneval	{
1086	u_long	ipftu_long;
1087	u_int	ipftu_int;
1088	u_short	ipftu_short;
1089	u_char	ipftu_char;
1090} ipftuneval_t;
1091
1092typedef	struct	ipftune	{
1093	void    	*ipft_cookie;
1094	ipftuneval_t	ipft_un;
1095	u_long  	ipft_min;
1096	u_long  	ipft_max;
1097	int		ipft_sz;
1098	int		ipft_flags;
1099	char		ipft_name[80];
1100} ipftune_t;
1101
1102#define	ipft_vlong	ipft_un.ipftu_long
1103#define	ipft_vint	ipft_un.ipftu_int
1104#define	ipft_vshort	ipft_un.ipftu_short
1105#define	ipft_vchar	ipft_un.ipftu_char
1106
1107
1108/*
1109** HPUX Port
1110*/
1111#ifdef __hpux
1112/* HP-UX locking sequence deadlock detection module lock MAJOR ID */
1113# define	IPF_SMAJ	0	/* temp assignment XXX, not critical */
1114#endif
1115
1116#if !defined(CDEV_MAJOR) && defined (__FreeBSD_version) && \
1117    (__FreeBSD_version >= 220000)
1118# define	CDEV_MAJOR	79
1119#endif
1120
1121/*
1122 * Post NetBSD 1.2 has the PFIL interface for packet filters.  This turns
1123 * on those hooks.  We don't need any special mods in non-IP Filter code
1124 * with this!
1125 */
1126#if (defined(NetBSD) && (NetBSD > 199609) && (NetBSD <= 1991011)) || \
1127    (defined(NetBSD1_2) && NetBSD1_2 > 1) || \
1128    (defined(__FreeBSD__) && (__FreeBSD_version >= 500043))
1129# if defined(NetBSD) && (NetBSD >= 199905)
1130#  define PFIL_HOOKS
1131# endif
1132# ifdef PFIL_HOOKS
1133#  define NETBSD_PF
1134# endif
1135#endif
1136
1137#ifndef	_KERNEL
1138extern	int	fr_check __P((struct ip *, int, void *, int, mb_t **));
1139extern	int	(*fr_checkp) __P((ip_t *, int, void *, int, mb_t **));
1140extern	int	ipf_log __P((void));
1141extern	struct	ifnet *get_unit __P((char *, int));
1142extern	char	*get_ifname __P((struct ifnet *));
1143# if defined(__NetBSD__) || defined(__OpenBSD__) || \
1144	  (_BSDI_VERSION >= 199701) || (__FreeBSD_version >= 300000)
1145extern	int	iplioctl __P((int, ioctlcmd_t, caddr_t, int));
1146# else
1147extern	int	iplioctl __P((int, ioctlcmd_t, caddr_t, int));
1148# endif
1149extern	int	iplopen __P((dev_t, int));
1150extern	int	iplclose __P((dev_t, int));
1151extern	void	m_freem __P((mb_t *));
1152#else /* #ifndef _KERNEL */
1153# if defined(__NetBSD__) && defined(PFIL_HOOKS)
1154extern	void	ipfilterattach __P((int));
1155# endif
1156extern	int	ipl_enable __P((void));
1157extern	int	ipl_disable __P((void));
1158# ifdef MENTAT
1159extern	int	fr_check __P((struct ip *, int, void *, int, void *,
1160			      mblk_t **));
1161#  if SOLARIS
1162#   if SOLARIS2 >= 7
1163extern	int	iplioctl __P((dev_t, int, intptr_t, int, cred_t *, int *));
1164#   else
1165extern	int	iplioctl __P((dev_t, int, int *, int, cred_t *, int *));
1166#   endif
1167extern	int	iplopen __P((dev_t *, int, int, cred_t *));
1168extern	int	iplclose __P((dev_t, int, int, cred_t *));
1169extern	int	iplread __P((dev_t, uio_t *, cred_t *));
1170extern	int	iplwrite __P((dev_t, uio_t *, cred_t *));
1171#  endif
1172#  ifdef __hpux
1173extern	int	iplopen __P((dev_t, int, intptr_t, int));
1174extern	int	iplclose __P((dev_t, int, int));
1175extern	int	iplioctl __P((dev_t, int, caddr_t, int));
1176extern	int	iplread __P((dev_t, uio_t *));
1177extern	int	iplwrite __P((dev_t, uio_t *));
1178extern	int	iplselect __P((dev_t, int));
1179#  endif
1180extern	int	ipfsync __P((void));
1181extern	int	fr_qout __P((queue_t *, mblk_t *));
1182# else /* MENTAT */
1183extern	int	fr_check __P((struct ip *, int, void *, int, mb_t **));
1184extern	int	(*fr_checkp) __P((ip_t *, int, void *, int, mb_t **));
1185extern	size_t	mbufchainlen __P((mb_t *));
1186#  ifdef	__sgi
1187#   include <sys/cred.h>
1188extern	int	iplioctl __P((dev_t, int, caddr_t, int, cred_t *, int *));
1189extern	int	iplopen __P((dev_t *, int, int, cred_t *));
1190extern	int	iplclose __P((dev_t, int, int, cred_t *));
1191extern	int	iplread __P((dev_t, uio_t *, cred_t *));
1192extern	int	iplwrite __P((dev_t, uio_t *, cred_t *));
1193extern	int	ipfsync __P((void));
1194extern	int	ipfilter_sgi_attach __P((void));
1195extern	void	ipfilter_sgi_detach __P((void));
1196extern	void	ipfilter_sgi_intfsync __P((void));
1197#  else
1198#   ifdef	IPFILTER_LKM
1199extern	int	iplidentify __P((char *));
1200#   endif
1201#   if (defined(_BSDI_VERSION) && _BSDI_VERSION >= 199510) || \
1202      (__FreeBSD_version >= 220000) || \
1203      (NetBSD >= 199511) || defined(__OpenBSD__)
1204#    if defined(__NetBSD__) || \
1205       (defined(_BSDI_VERSION) && _BSDI_VERSION >= 199701) || \
1206       defined(__OpenBSD__) || (__FreeBSD_version >= 300000)
1207#     if (__FreeBSD_version >= 500024)
1208#      if (__FreeBSD_version >= 502116)
1209extern	int	iplioctl __P((struct cdev*, u_long, caddr_t, int, struct thread *));
1210#      else
1211extern	int	iplioctl __P((dev_t, u_long, caddr_t, int, struct thread *));
1212#      endif /* __FreeBSD_version >= 502116 */
1213#     else
1214extern	int	iplioctl __P((dev_t, u_long, caddr_t, int, struct proc *));
1215#     endif /* __FreeBSD_version >= 500024 */
1216#    else
1217extern	int	iplioctl __P((dev_t, int, caddr_t, int, struct thread *));
1218#    endif
1219#    if (__FreeBSD_version >= 500024)
1220#      if (__FreeBSD_version >= 502116)
1221extern	int	iplopen __P((struct cdev*, int, int, struct thread *));
1222extern	int	iplclose __P((struct cdev*, int, int, struct thread *));
1223#      else
1224extern	int	iplopen __P((dev_t, int, int, struct thread *));
1225extern	int	iplclose __P((dev_t, int, int, struct thread *));
1226#      endif /* __FreeBSD_version >= 502116 */
1227#    else
1228extern	int	iplopen __P((dev_t, int, int, struct proc *));
1229extern	int	iplclose __P((dev_t, int, int, struct proc *));
1230#    endif /* __FreeBSD_version >= 500024 */
1231#   else
1232#    ifdef linux
1233extern	int	iplioctl __P((struct inode *, struct file *, u_int, u_long));
1234#    else
1235extern	int	iplopen __P((dev_t, int));
1236extern	int	iplclose __P((dev_t, int));
1237extern	int	iplioctl __P((dev_t, int, caddr_t, int));
1238#    endif
1239#   endif /* (_BSDI_VERSION >= 199510) */
1240#   if	BSD >= 199306
1241#      if (__FreeBSD_version >= 502116)
1242extern	int	iplread __P((struct cdev*, struct uio *, int));
1243extern	int	iplwrite __P((struct cdev*, struct uio *, int));
1244#      else
1245extern	int	iplread __P((dev_t, struct uio *, int));
1246extern	int	iplwrite __P((dev_t, struct uio *, int));
1247#      endif /* __FreeBSD_version >= 502116 */
1248#   else
1249#    ifndef linux
1250extern	int	iplread __P((dev_t, struct uio *));
1251extern	int	iplwrite __P((dev_t, struct uio *));
1252#    endif
1253#   endif /* BSD >= 199306 */
1254#  endif /* __ sgi */
1255# endif /* MENTAT */
1256
1257#endif /* #ifndef _KERNEL */
1258
1259extern	ipfmutex_t	ipl_mutex, ipf_authmx, ipf_rw, ipf_hostmap;
1260extern	ipfmutex_t	ipf_timeoutlock, ipf_stinsert, ipf_natio, ipf_nat_new;
1261extern	ipfrwlock_t	ipf_mutex, ipf_global, ip_poolrw, ipf_ipidfrag;
1262extern	ipfrwlock_t	ipf_frag, ipf_state, ipf_nat, ipf_natfrag, ipf_auth;
1263extern	ipfrwlock_t	ipf_frcache;
1264
1265extern	char	*memstr __P((const char *, char *, int, int));
1266extern	int	count4bits __P((u_32_t));
1267extern	int	frrequest __P((int, ioctlcmd_t, caddr_t, int, int));
1268extern	char	*getifname __P((struct ifnet *));
1269extern	int	iplattach __P((void));
1270extern	int	ipldetach __P((void));
1271extern	u_short	ipf_cksum __P((u_short *, int));
1272extern	int	copyinptr __P((void *, void *, size_t));
1273extern	int	copyoutptr __P((void *, void *, size_t));
1274extern	int	fr_fastroute __P((mb_t *, mb_t **, fr_info_t *, frdest_t *));
1275extern	int	fr_inobj __P((void *, void *, int));
1276extern	int	fr_inobjsz __P((void *, void *, int, int));
1277extern	int	fr_ioctlswitch __P((int, void *, ioctlcmd_t, int));
1278extern	int	fr_ipftune __P((ioctlcmd_t, void *));
1279extern	int	fr_outobj __P((void *, void *, int));
1280extern	int	fr_outobjsz __P((void *, void *, int, int));
1281extern	void	*fr_pullup __P((mb_t *, fr_info_t *, int));
1282extern	void	fr_resolvedest __P((struct frdest *, int));
1283extern	int	fr_resolvefunc __P((void *));
1284extern	void	*fr_resolvenic __P((char *, int));
1285extern	int	fr_send_icmp_err __P((int, fr_info_t *, int));
1286extern	int	fr_send_reset __P((fr_info_t *));
1287#if  (__FreeBSD_version < 490000) || !defined(_KERNEL)
1288extern	int	ppsratecheck __P((struct timeval *, int *, int));
1289#endif
1290extern	ipftq_t	*fr_addtimeoutqueue __P((ipftq_t **, u_int));
1291extern	void	fr_deletequeueentry __P((ipftqent_t *));
1292extern	int	fr_deletetimeoutqueue __P((ipftq_t *));
1293extern	void	fr_freetimeoutqueue __P((ipftq_t *));
1294extern	void	fr_movequeue __P((ipftqent_t *, ipftq_t *, ipftq_t *));
1295extern	void	fr_queueappend __P((ipftqent_t *, ipftq_t *, void *));
1296extern	void	fr_queueback __P((ipftqent_t *));
1297extern	void	fr_queuefront __P((ipftqent_t *));
1298extern	void	fr_checkv4sum __P((fr_info_t *));
1299extern	int	fr_checkl4sum __P((fr_info_t *));
1300extern	int	fr_ifpfillv4addr __P((int, struct sockaddr_in *,
1301				      struct sockaddr_in *, struct in_addr *,
1302				      struct in_addr *));
1303extern	int	fr_coalesce __P((fr_info_t *));
1304#ifdef	USE_INET6
1305extern	void	fr_checkv6sum __P((fr_info_t *));
1306extern	int	fr_ifpfillv6addr __P((int, struct sockaddr_in6 *,
1307				      struct sockaddr_in6 *, struct in_addr *,
1308				      struct in_addr *));
1309#endif
1310
1311extern	int		fr_addipftune __P((ipftuneable_t *));
1312extern	int		fr_delipftune __P((ipftuneable_t *));
1313
1314extern	int	frflush __P((minor_t, int, int));
1315extern	void	frsync __P((void *));
1316extern	frgroup_t *fr_addgroup __P((char *, void *, u_32_t, minor_t, int));
1317extern	int	fr_derefrule __P((frentry_t **));
1318extern	void	fr_delgroup __P((char *, minor_t, int));
1319extern	frgroup_t *fr_findgroup __P((char *, minor_t, int, frgroup_t ***));
1320
1321extern	int	fr_loginit __P((void));
1322extern	int	ipflog_clear __P((minor_t));
1323extern	int	ipflog_read __P((minor_t, uio_t *));
1324extern	int	ipflog __P((fr_info_t *, u_int));
1325extern	int	ipllog __P((int, fr_info_t *, void **, size_t *, int *, int));
1326extern	void	fr_logunload __P((void));
1327
1328extern	frentry_t	*fr_acctpkt __P((fr_info_t *, u_32_t *));
1329extern	int		fr_copytolog __P((int, char *, int));
1330extern	u_short		fr_cksum __P((mb_t *, ip_t *, int, void *));
1331extern	void		fr_deinitialise __P((void));
1332extern	frentry_t 	*fr_dolog __P((fr_info_t *, u_32_t *));
1333extern	frentry_t 	*fr_dstgrpmap __P((fr_info_t *, u_32_t *));
1334extern	void		fr_fixskip __P((frentry_t **, frentry_t *, int));
1335extern	void		fr_forgetifp __P((void *));
1336extern	frentry_t 	*fr_getrulen __P((int, char *, u_32_t));
1337extern	void		fr_getstat __P((struct friostat *));
1338extern	int		fr_ifpaddr __P((int, int, void *,
1339				struct in_addr *, struct in_addr *));
1340extern	int		fr_initialise __P((void));
1341extern	void		fr_lock __P((caddr_t, int *));
1342extern  int		fr_makefrip __P((int, ip_t *, fr_info_t *));
1343extern	int		fr_matchtag __P((ipftag_t *, ipftag_t *));
1344extern	int		fr_matchicmpqueryreply __P((int, icmpinfo_t *,
1345					    struct icmp *, int));
1346extern	u_32_t		fr_newisn __P((fr_info_t *));
1347extern	u_short		fr_nextipid __P((fr_info_t *));
1348extern	int		fr_rulen __P((int, frentry_t *));
1349extern	int		fr_scanlist __P((fr_info_t *, u_32_t));
1350extern	frentry_t 	*fr_srcgrpmap __P((fr_info_t *, u_32_t *));
1351extern	int		fr_tcpudpchk __P((fr_info_t *, frtuc_t *));
1352extern	int		fr_verifysrc __P((fr_info_t *fin));
1353extern	int		fr_zerostats __P((char *));
1354
1355extern	int	fr_running;
1356extern	u_long	fr_frouteok[2];
1357extern	int	fr_pass;
1358extern	int	fr_flags;
1359extern	int	fr_active;
1360extern	int	fr_chksrc;
1361extern	int	fr_minttl;
1362extern	int	fr_refcnt;
1363extern	int	fr_control_forwarding;
1364extern	int	fr_update_ipid;
1365extern	int	nat_logging;
1366extern	int	ipstate_logging;
1367extern	int	ipl_suppress;
1368extern	int	ipl_buffer_sz;
1369extern	int	ipl_logmax;
1370extern	int	ipl_logall;
1371extern	int	ipl_logsize;
1372extern	u_long	fr_ticks;
1373extern	fr_info_t	frcache[2][8];
1374extern	char	ipfilter_version[];
1375extern	iplog_t	**iplh[IPL_LOGMAX+1], *iplt[IPL_LOGMAX+1];
1376extern	int	iplused[IPL_LOGMAX + 1];
1377extern	struct frentry *ipfilter[2][2], *ipacct[2][2];
1378#ifdef	USE_INET6
1379extern	struct frentry *ipfilter6[2][2], *ipacct6[2][2];
1380extern	int	icmptoicmp6types[ICMP_MAXTYPE+1];
1381extern	int	icmptoicmp6unreach[ICMP_MAX_UNREACH];
1382extern	int	icmpreplytype6[ICMP6_MAXTYPE + 1];
1383#endif
1384extern	int	icmpreplytype4[ICMP_MAXTYPE + 1];
1385extern	struct frgroup *ipfgroups[IPL_LOGSIZE][2];
1386extern	struct filterstats frstats[];
1387extern	frentry_t *ipfrule_match __P((fr_info_t *));
1388extern	u_char	ipf_iss_secret[32];
1389extern	ipftuneable_t ipf_tuneables[];
1390
1391#endif	/* __IP_FIL_H__ */
1392