ip_fil.h revision 80482
1229997Sken/*
2229997Sken * Copyright (C) 1993-2001 by Darren Reed.
3232604Strasz *
4229997Sken * See the IPFILTER.LICENCE file for details on licencing.
5229997Sken *
6232604Strasz * @(#)ip_fil.h	1.35 6/5/96
7232604Strasz * $Id: ip_fil.h,v 2.29.2.4 2000/11/12 11:54:53 darrenr Exp $
8232604Strasz * $FreeBSD: head/sys/contrib/ipfilter/netinet/ip_fil.h 80482 2001-07-28 11:58:26Z darrenr $
9229997Sken */
10229997Sken
11229997Sken#ifndef	__IP_FIL_H__
12229997Sken#define	__IP_FIL_H__
13229997Sken
14229997Sken/*
15229997Sken * Pathnames for various IP Filter control devices.  Used by LKM
16229997Sken * and userland, so defined here.
17229997Sken */
18229997Sken#define	IPNAT_NAME	"/dev/ipnat"
19229997Sken#define	IPSTATE_NAME	"/dev/ipstate"
20229997Sken#define	IPAUTH_NAME	"/dev/ipauth"
21229997Sken
22229997Sken#ifndef	SOLARIS
23229997Sken# define SOLARIS (defined(sun) && (defined(__svr4__) || defined(__SVR4)))
24229997Sken#endif
25229997Sken
26229997Sken#if defined(KERNEL) && !defined(_KERNEL)
27229997Sken# define	_KERNEL
28229997Sken#endif
29229997Sken
30229997Sken#ifndef	__P
31229997Sken# ifdef	__STDC__
32229997Sken#  define	__P(x)	x
33229997Sken# else
34229997Sken#  define	__P(x)	()
35229997Sken# endif
36229997Sken#endif
37229997Sken
38229997Sken#if defined(__STDC__) || defined(__GNUC__)
39229997Sken# define	SIOCADAFR	_IOW('r', 60, struct frentry *)
40229997Sken# define	SIOCRMAFR	_IOW('r', 61, struct frentry *)
41229997Sken# define	SIOCSETFF	_IOW('r', 62, u_int)
42229997Sken# define	SIOCGETFF	_IOR('r', 63, u_int)
43229997Sken# define	SIOCGETFS	_IOWR('r', 64, struct friostat *)
44229997Sken# define	SIOCIPFFL	_IOWR('r', 65, int)
45229997Sken# define	SIOCIPFFB	_IOR('r', 66, int)
46229997Sken# define	SIOCADIFR	_IOW('r', 67, struct frentry *)
47229997Sken# define	SIOCRMIFR	_IOW('r', 68, struct frentry *)
48229997Sken# define	SIOCSWAPA	_IOR('r', 69, u_int)
49229997Sken# define	SIOCINAFR	_IOW('r', 70, struct frentry *)
50229997Sken# define	SIOCINIFR	_IOW('r', 71, struct frentry *)
51229997Sken# define	SIOCFRENB	_IOW('r', 72, u_int)
52229997Sken# define	SIOCFRSYN	_IOW('r', 73, u_int)
53264886Smav# define	SIOCFRZST	_IOWR('r', 74, struct friostat *)
54229997Sken# define	SIOCZRLST	_IOWR('r', 75, struct frentry *)
55229997Sken# define	SIOCAUTHW	_IOWR('r', 76, struct fr_info *)
56229997Sken# define	SIOCAUTHR	_IOWR('r', 77, struct fr_info *)
57229997Sken# define	SIOCATHST	_IOWR('r', 78, struct fr_authstat *)
58229997Sken# define	SIOCSTLCK	_IOWR('r', 79, u_int)
59287621Smav# define	SIOCSTPUT	_IOWR('r', 80, struct ipstate_save *)
60229997Sken# define	SIOCSTGET	_IOWR('r', 81, struct ipstate_save *)
61229997Sken# define	SIOCSTGSZ	_IOWR('r', 82, struct natget)
62287621Smav# define	SIOCGFRST	_IOWR('r', 83, struct ipfrstat *)
63229997Sken#else
64229997Sken# define	SIOCADAFR	_IOW(r, 60, struct frentry *)
65229997Sken# define	SIOCRMAFR	_IOW(r, 61, struct frentry *)
66229997Sken# define	SIOCSETFF	_IOW(r, 62, u_int)
67229997Sken# define	SIOCGETFF	_IOR(r, 63, u_int)
68229997Sken# define	SIOCGETFS	_IOWR(r, 64, struct friostat *)
69287621Smav# define	SIOCIPFFL	_IOWR(r, 65, int)
70287621Smav# define	SIOCIPFFB	_IOR(r, 66, int)
71229997Sken# define	SIOCADIFR	_IOW(r, 67, struct frentry *)
72229997Sken# define	SIOCRMIFR	_IOW(r, 68, struct frentry *)
73229997Sken# define	SIOCSWAPA	_IOR(r, 69, u_int)
74229997Sken# define	SIOCINAFR	_IOW(r, 70, struct frentry *)
75229997Sken# define	SIOCINIFR	_IOW(r, 71, struct frentry *)
76229997Sken# define	SIOCFRENB	_IOW(r, 72, u_int)
77229997Sken# define	SIOCFRSYN	_IOW(r, 73, u_int)
78229997Sken# define	SIOCFRZST	_IOWR(r, 74, struct friostat *)
79229997Sken# define	SIOCZRLST	_IOWR(r, 75, struct frentry *)
80287500Smav# define	SIOCAUTHW	_IOWR(r, 76, struct fr_info *)
81264886Smav# define	SIOCAUTHR	_IOWR(r, 77, struct fr_info *)
82229997Sken# define	SIOCATHST	_IOWR(r, 78, struct fr_authstat *)
83229997Sken# define	SIOCSTLCK	_IOWR(r, 79, u_int)
84229997Sken# define	SIOCSTPUT	_IOWR(r, 80, struct ipstate_save *)
85229997Sken# define	SIOCSTGET	_IOWR(r, 81, struct ipstate_save *)
86229997Sken# define	SIOCSTGSZ	_IOWR(r, 82, struct natget)
87287499Smav# define	SIOCGFRST	_IOWR(r, 83, struct ipfrstat *)
88264886Smav#endif
89264886Smav#define	SIOCADDFR	SIOCADAFR
90264886Smav#define	SIOCDELFR	SIOCRMAFR
91267877Smav#define	SIOCINSFR	SIOCINAFR
92229997Sken
93229997Sken
94229997Skentypedef	struct	fr_ip	{
95229997Sken	u_32_t	fi_v:4;		/* IP version */
96229997Sken	u_32_t	fi_fl:4;	/* packet flags */
97229997Sken	u_32_t	fi_tos:8;	/* IP packet TOS */
98229997Sken	u_32_t	fi_ttl:8;	/* IP packet TTL */
99229997Sken	u_32_t	fi_p:8;		/* IP packet protocol */
100229997Sken	union	i6addr fi_src;	/* source address from packet */
101229997Sken	union	i6addr fi_dst;	/* destination address from packet */
102229997Sken	u_32_t	fi_optmsk;	/* bitmask composed from IP options */
103229997Sken	u_short	fi_secmsk;	/* bitmask composed from IP security options */
104229997Sken	u_short	fi_auth;	/* authentication code from IP sec. options */
105229997Sken} fr_ip_t;
106229997Sken
107229997Sken#define	FI_OPTIONS	(FF_OPTIONS >> 24)
108287621Smav#define	FI_TCPUDP	(FF_TCPUDP >> 24)	/* TCP/UCP implied comparison*/
109229997Sken#define	FI_FRAG		(FF_FRAG >> 24)
110229997Sken#define	FI_SHORT	(FF_SHORT >> 24)
111229997Sken#define	FI_CMP		(FI_OPTIONS|FI_TCPUDP|FI_SHORT)
112229997Sken
113229997Sken#define	fi_saddr	fi_src.in4.s_addr
114264886Smav#define	fi_daddr	fi_dst.in4.s_addr
115229997Sken
116229997Sken
117229997Sken/*
118229997Sken * These are both used by the state and NAT code to indicate that one port or
119229997Sken * the other should be treated as a wildcard.
120287499Smav */
121232604Strasz#define	FI_W_SPORT	0x00000100
122232604Strasz#define	FI_W_DPORT	0x00000200
123264886Smav#define	FI_WILDP	(FI_W_SPORT|FI_W_DPORT)
124229997Sken#define	FI_W_SADDR	0x00000400
125229997Sken#define	FI_W_DADDR	0x00000800
126229997Sken#define	FI_WILDA	(FI_W_SADDR|FI_W_DADDR)
127229997Sken#define	FI_NEWFR	0x00001000
128229997Sken
129229997Skentypedef	struct	fr_info	{
130229997Sken	void	*fin_ifp;		/* interface packet is `on' */
131229997Sken	struct	fr_ip	fin_fi;		/* IP Packet summary */
132230334Sken	u_short	fin_data[2];		/* TCP/UDP ports, ICMP code/type */
133230334Sken	u_char	fin_out;		/* in or out ? 1 == out, 0 == in */
134230334Sken	u_char	fin_rev;		/* state only: 1 = reverse */
135230334Sken	u_short	fin_hlen;		/* length of IP header in bytes */
136230334Sken	u_char	fin_tcpf;		/* TCP header flags (SYN, ACK, etc) */
137230334Sken	/* From here on is packet specific */
138230334Sken	u_char	fin_icode;		/* ICMP error to return */
139230334Sken	u_short	fin_rule;		/* rule # last matched */
140229997Sken	u_32_t	fin_group;		/* group number, -1 for none */
141229997Sken	struct	frentry *fin_fr;	/* last matching rule */
142229997Sken	char	*fin_dp;		/* start of data past IP header */
143229997Sken	u_short	fin_dlen;		/* length of data portion of packet */
144229997Sken	u_short	fin_id;			/* IP packet id field */
145229997Sken	void	*fin_mp;		/* pointer to pointer to mbuf */
146229997Sken#if SOLARIS
147229997Sken	void	*fin_qfm;		/* pointer to mblk where pkt starts */
148229997Sken	void	*fin_qif;
149229997Sken#endif
150240993Strasz	u_short	fin_plen;
151229997Sken	u_short	fin_off;
152229997Sken} fr_info_t;
153229997Sken
154229997Sken#define	fin_v		fin_fi.fi_v
155229997Sken#define	fin_saddr	fin_fi.fi_saddr
156229997Sken#define	fin_daddr	fin_fi.fi_daddr
157229997Sken#define	fin_fl		fin_fi.fi_fl
158267877Smav
159229997Sken/*
160229997Sken * Size for compares on fr_info structures
161264886Smav */
162229997Sken#define	FI_CSIZE	offsetof(fr_info_t, fin_icode)
163229997Sken
164229997Sken/*
165229997Sken * Size for copying cache fr_info structure
166229997Sken */
167240993Strasz#define	FI_COPYSIZE	offsetof(fr_info_t, fin_dp)
168229997Sken
169229997Skentypedef	struct	frdest	{
170229997Sken	void	*fd_ifp;
171229997Sken	struct	in_addr	fd_ip;
172229997Sken	char	fd_ifname[IFNAMSIZ];
173229997Sken#if SOLARIS
174229997Sken	mb_t	*fd_mp;			/* cache resolver for to/dup-to */
175229997Sken#endif
176229997Sken} frdest_t;
177229997Sken
178229997Skentypedef	struct	frpcmp	{
179229997Sken	int	frp_cmp;	/* data for port comparisons */
180229997Sken	u_short	frp_port;	/* top port for <> and >< */
181229997Sken	u_short	frp_top;	/* top port for <> and >< */
182229997Sken} frpcmp_t;
183229997Sken
184229997Skentypedef	struct	frtuc	{
185229997Sken	u_char	ftu_tcpfm;	/* tcp flags mask */
186229997Sken	u_char	ftu_tcpf;	/* tcp flags */
187229997Sken	frpcmp_t	ftu_src;
188229997Sken	frpcmp_t	ftu_dst;
189229997Sken} frtuc_t;
190229997Sken
191229997Sken#define	ftu_scmp	ftu_src.frp_cmp
192229997Sken#define	ftu_dcmp	ftu_dst.frp_cmp
193229997Sken#define	ftu_sport	ftu_src.frp_port
194229997Sken#define	ftu_dport	ftu_dst.frp_port
195229997Sken#define	ftu_stop	ftu_src.frp_top
196229997Sken#define	ftu_dtop	ftu_dst.frp_top
197229997Sken
198229997Skentypedef	struct	frentry {
199229997Sken	struct	frentry	*fr_next;
200229997Sken	struct	frentry	*fr_grp;
201229997Sken	int	fr_ref;		/* reference count - for grouping */
202229997Sken	void	*fr_ifa;
203287499Smav#if BSD >= 199306
204287499Smav	void	*fr_oifa;
205229997Sken#endif
206229997Sken	/*
207229997Sken	 * These are only incremented when a packet  matches this rule and
208229997Sken	 * it is the last match
209229997Sken	 */
210229997Sken	U_QUAD_T	fr_hits;
211229997Sken	U_QUAD_T	fr_bytes;
212229997Sken	/*
213229997Sken	 * Fields after this may not change whilst in the kernel.
214229997Sken	 */
215229997Sken	struct	fr_ip	fr_ip;
216229997Sken	struct	fr_ip	fr_mip;	/* mask structure */
217229997Sken
218229997Sken
219229997Sken	u_short	fr_icmpm;	/* data for ICMP packets (mask) */
220229997Sken	u_short	fr_icmp;
221229997Sken
222229997Sken	frtuc_t	fr_tuc;
223229997Sken	u_32_t	fr_group;	/* group to which this rule belongs */
224229997Sken	u_32_t	fr_grhead;	/* group # which this rule starts */
225229997Sken	u_32_t	fr_flags;	/* per-rule flags && options (see below) */
226229997Sken	u_int	fr_skip;	/* # of rules to skip */
227287499Smav	u_int	fr_loglevel;	/* syslog log facility + priority */
228264886Smav	int	(*fr_func) __P((int, ip_t *, fr_info_t *));	/* call this function */
229229997Sken	int	fr_sap;		/* For solaris only */
230229997Sken	u_char	fr_icode;	/* return ICMP code */
231229997Sken	char	fr_ifname[IFNAMSIZ];
232229997Sken#if BSD >= 199306
233229997Sken	char	fr_oifname[IFNAMSIZ];
234287499Smav#endif
235264886Smav	struct	frdest	fr_tif;	/* "to" interface */
236287499Smav	struct	frdest	fr_dif;	/* duplicate packet interfaces */
237264886Smav	u_int	fr_cksum;	/* checksum on filter rules for performance */
238288215Smav} frentry_t;
239264886Smav
240264886Smav#define	fr_v		fr_ip.fi_v
241288215Smav#define	fr_proto	fr_ip.fi_p
242264886Smav#define	fr_ttl		fr_ip.fi_ttl
243264886Smav#define	fr_tos		fr_ip.fi_tos
244264886Smav#define	fr_tcpfm	fr_tuc.ftu_tcpfm
245264886Smav#define	fr_tcpf		fr_tuc.ftu_tcpf
246275058Smav#define	fr_scmp		fr_tuc.ftu_scmp
247275058Smav#define	fr_dcmp		fr_tuc.ftu_dcmp
248275058Smav#define	fr_dport	fr_tuc.ftu_dport
249275058Smav#define	fr_sport	fr_tuc.ftu_sport
250267519Smav#define	fr_stop		fr_tuc.ftu_stop
251267877Smav#define	fr_dtop		fr_tuc.ftu_dtop
252264886Smav#define	fr_dst		fr_ip.fi_dst.in4
253264886Smav#define	fr_src		fr_ip.fi_src.in4
254267877Smav#define	fr_dmsk		fr_mip.fi_dst.in4
255264886Smav#define	fr_smsk		fr_mip.fi_src.in4
256264886Smav
257264886Smav#ifndef	offsetof
258264886Smav#define	offsetof(t,m)	(int)((&((t *)0L)->m))
259275009Smav#endif
260275058Smav#define	FR_CMPSIZ	(sizeof(struct frentry) - offsetof(frentry_t, fr_ip))
261275058Smav
262275058Smav/*
263229997Sken * fr_flags
264229997Sken */
265229997Sken#define	FR_BLOCK	0x00001	/* do not allow packet to pass */
266229997Sken#define	FR_PASS		0x00002	/* allow packet to pass */
267229997Sken#define	FR_OUTQUE	0x00004	/* outgoing packets */
268229997Sken#define	FR_INQUE	0x00008	/* ingoing packets */
269229997Sken#define	FR_LOG		0x00010	/* Log */
270229997Sken#define	FR_LOGB		0x00011	/* Log-fail */
271229997Sken#define	FR_LOGP		0x00012	/* Log-pass */
272229997Sken#define	FR_LOGBODY	0x00020	/* Log the body */
273229997Sken#define	FR_LOGFIRST	0x00040	/* Log the first byte if state held */
274229997Sken#define	FR_RETRST	0x00080	/* Return TCP RST packet - reset connection */
275229997Sken#define	FR_RETICMP	0x00100	/* Return ICMP unreachable packet */
276267537Smav#define	FR_FAKEICMP	0x00180	/* Return ICMP unreachable with fake source */
277229997Sken#define	FR_NOMATCH	0x00200	/* no match occured */
278229997Sken#define	FR_ACCOUNT	0x00400	/* count packet bytes */
279229997Sken#define	FR_KEEPFRAG	0x00800	/* keep fragment information */
280229997Sken#define	FR_KEEPSTATE	0x01000	/* keep `connection' state information */
281229997Sken#define	FR_INACTIVE	0x02000
282229997Sken#define	FR_QUICK	0x04000	/* match & stop processing list */
283287499Smav#define	FR_FASTROUTE	0x08000	/* bypass normal routing */
284267537Smav#define	FR_CALLNOW	0x10000	/* call another function (fr_func) if matches */
285229997Sken#define	FR_DUP		0x20000	/* duplicate packet */
286287499Smav#define	FR_LOGORBLOCK	0x40000	/* block the packet if it can't be logged */
287267519Smav#define	FR_NOTSRCIP	0x80000	/* not the src IP# */
288267537Smav#define	FR_NOTDSTIP	0x100000	/* not the dst IP# */
289267537Smav#define	FR_AUTH		0x200000	/* use authentication */
290267537Smav#define	FR_PREAUTH	0x400000	/* require preauthentication */
291267537Smav#define	FR_DONTCACHE	0x800000	/* don't cache the result */
292267537Smav
293267537Smav#define	FR_LOGMASK	(FR_LOG|FR_LOGP|FR_LOGB)
294267519Smav#define	FR_RETMASK	(FR_RETICMP|FR_RETRST|FR_FAKEICMP)
295287499Smav
296264886Smav/*
297264886Smav * These correspond to #define's for FI_* and are stored in fr_flags
298264886Smav */
299229997Sken#define	FF_OPTIONS	0x01000000
300264886Smav#define	FF_TCPUDP	0x02000000
301264886Smav#define	FF_FRAG		0x04000000
302264886Smav#define	FF_SHORT	0x08000000
303264886Smav/*
304264886Smav * recognized flags for SIOCGETFF and SIOCSETFF, and get put in fr_flags
305264886Smav */
306264886Smav#define	FF_LOGPASS	0x10000000
307264886Smav#define	FF_LOGBLOCK	0x20000000
308264886Smav#define	FF_LOGNOMATCH	0x40000000
309229997Sken#define	FF_LOGGING	(FF_LOGPASS|FF_LOGBLOCK|FF_LOGNOMATCH)
310264886Smav#define	FF_BLOCKNONIP	0x80000000	/* Solaris2 Only */
311267519Smav
312229997Sken#define	FR_NONE 0
313264886Smav#define	FR_EQUAL 1
314264886Smav#define	FR_NEQUAL 2
315229997Sken#define FR_LESST 3
316264886Smav#define FR_GREATERT 4
317229997Sken#define FR_LESSTE 5
318229997Sken#define FR_GREATERTE 6
319264886Smav#define	FR_OUTRANGE 7
320229997Sken#define	FR_INRANGE 8
321275953Smav
322264886Smavtypedef	struct	filterstats {
323229997Sken	u_long	fr_pass;	/* packets allowed */
324229997Sken	u_long	fr_block;	/* packets denied */
325264886Smav	u_long	fr_nom;		/* packets which don't match any rule */
326264886Smav	u_long	fr_short;	/* packets which are short */
327229997Sken	u_long	fr_ppkl;	/* packets allowed and logged */
328264886Smav	u_long	fr_bpkl;	/* packets denied and logged */
329229997Sken	u_long	fr_npkl;	/* packets unmatched and logged */
330264886Smav	u_long	fr_pkl;		/* packets logged */
331264886Smav	u_long	fr_skip;	/* packets to be logged but buffer full */
332264886Smav	u_long	fr_ret;		/* packets for which a return is sent */
333264886Smav	u_long	fr_acct;	/* packets for which counting was performed */
334229997Sken	u_long	fr_bnfr;	/* bad attempts to allocate fragment state */
335267514Smav	u_long	fr_nfr;		/* new fragment state kept */
336267514Smav	u_long	fr_cfr;		/* add new fragment state but complete pkt */
337264886Smav	u_long	fr_bads;	/* bad attempts to allocate packet state */
338264886Smav	u_long	fr_ads;		/* new packet state kept */
339264886Smav	u_long	fr_chit;	/* cached hit */
340267519Smav	u_long	fr_tcpbad;	/* TCP checksum check failures */
341229997Sken	u_long	fr_pull[2];	/* good and bad pullup attempts */
342288215Smav	u_long	fr_badsrc;	/* source received doesn't match route */
343229997Sken	u_long	fr_badttl;	/* TTL in packet doesn't reach minimum */
344229997Sken#if SOLARIS
345264886Smav	u_long	fr_notdata;	/* PROTO/PCPROTO that have no data */
346229997Sken	u_long	fr_nodata;	/* mblks that have no data */
347264886Smav	u_long	fr_bad;		/* bad IP packets to the filter */
348264886Smav	u_long	fr_notip;	/* packets passed through no on ip queue */
349264886Smav	u_long	fr_drop;	/* packets dropped - no info for them! */
350264886Smav	u_long	fr_copy;	/* messages copied due to db_ref > 1 */
351264886Smav#endif
352264886Smav	u_long	fr_ipv6[2];	/* IPv6 packets in/out */
353264886Smav} filterstats_t;
354264886Smav
355264886Smav/*
356264886Smav * For SIOCGETFS
357267877Smav */
358264886Smavtypedef	struct	friostat	{
359264886Smav	struct	filterstats	f_st[2];
360264886Smav	struct	frentry		*f_fin[2];
361264886Smav	struct	frentry		*f_fout[2];
362264886Smav	struct	frentry		*f_acctin[2];
363264886Smav	struct	frentry		*f_acctout[2];
364267877Smav	struct	frentry		*f_fin6[2];
365264886Smav	struct	frentry		*f_fout6[2];
366264886Smav	struct	frentry		*f_acctin6[2];
367264886Smav	struct	frentry		*f_acctout6[2];
368267877Smav	struct	frentry		*f_auth;
369264886Smav	struct	frgroup		*f_groups[3][2];
370264886Smav	u_long	f_froute[2];
371264886Smav	int	f_defpass;	/* default pass - from fr_pass */
372264886Smav	char	f_active;	/* 1 or 0 - active rule set */
373264886Smav	char	f_running;	/* 1 if running, else 0 */
374264886Smav	char	f_logging;	/* 1 if enabled, else 0 */
375264886Smav	char	f_version[32];	/* version string */
376264886Smav	int	f_locks[4];
377264886Smav} friostat_t;
378267877Smav
379229997Skentypedef struct	optlist {
380229997Sken	u_short ol_val;
381229997Sken	int	ol_bit;
382229997Sken} optlist_t;
383229997Sken
384229997Sken
385229997Sken/*
386229997Sken * Group list structure.
387229997Sken */
388229997Skentypedef	struct frgroup {
389229997Sken	u_32_t	fg_num;
390229997Sken	struct	frgroup	*fg_next;
391229997Sken	struct	frentry	*fg_head;
392229997Sken	struct	frentry	**fg_start;
393229997Sken} frgroup_t;
394229997Sken
395229997Sken
396229997Sken/*
397229997Sken * Log structure.  Each packet header logged is prepended by one of these.
398229997Sken * Following this in the log records read from the device will be an ipflog
399287499Smav * structure which is then followed by any packet data.
400229997Sken */
401229997Skentypedef	struct	iplog	{
402229997Sken	u_32_t	ipl_magic;
403229997Sken	u_int	ipl_count;
404232604Strasz	u_long	ipl_sec;
405232604Strasz	u_long	ipl_usec;
406232604Strasz	size_t	ipl_dsize;
407229997Sken	struct	iplog	*ipl_next;
408229997Sken} iplog_t;
409229997Sken
410229997Sken#define IPL_MAGIC 0x49504c4d /* 'IPLM' */
411229997Sken
412229997Skentypedef	struct	ipflog	{
413229997Sken#if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199603)) || \
414229997Sken        (defined(OpenBSD) && (OpenBSD >= 199603))
415229997Sken	u_char	fl_ifname[IFNAMSIZ];
416229997Sken#else
417229997Sken	u_int	fl_unit;
418229997Sken	u_char	fl_ifname[4];
419229997Sken#endif
420229997Sken	u_char	fl_plen;	/* extra data after hlen */
421229997Sken	u_char	fl_hlen;	/* length of IP headers saved */
422229997Sken	u_short	fl_loglevel;	/* syslog log level */
423229997Sken	u_32_t	fl_rule;
424229997Sken	u_32_t	fl_group;
425229997Sken	u_32_t	fl_flags;
426229997Sken	u_32_t	fl_lflags;
427229997Sken} ipflog_t;
428229997Sken
429229997Sken
430229997Sken#ifndef	ICMP_UNREACH_FILTER
431229997Sken# define	ICMP_UNREACH_FILTER	13
432229997Sken#endif
433229997Sken
434229997Sken#ifndef	IPF_LOGGING
435229997Sken# define	IPF_LOGGING	0
436229997Sken#endif
437229997Sken#ifndef	IPF_DEFAULT_PASS
438229997Sken# define	IPF_DEFAULT_PASS	FR_PASS
439229997Sken#endif
440229997Sken
441287499Smav#define	IPMINLEN(i, h)	((i)->ip_len >= ((i)->ip_hl * 4 + sizeof(struct h)))
442229997Sken#define	IPLLOGSIZE	8192
443229997Sken
444229997Sken#define	IPF_OPTCOPY	0x07ff00	/* bit mask of copied options */
445229997Sken
446229997Sken/*
447229997Sken * Device filenames for reading log information.  Use ipf on Solaris2 because
448229997Sken * ipl is already a name used by something else.
449229997Sken */
450229997Sken#ifndef	IPL_NAME
451229997Sken# if	SOLARIS
452229997Sken#  define	IPL_NAME	"/dev/ipf"
453287499Smav# else
454229997Sken#  define	IPL_NAME	"/dev/ipl"
455229997Sken# endif
456229997Sken#endif
457229997Sken#define	IPL_NAT		IPNAT_NAME
458229997Sken#define	IPL_STATE	IPSTATE_NAME
459229997Sken#define	IPL_AUTH	IPAUTH_NAME
460229997Sken
461229997Sken#define	IPL_LOGIPF	0	/* Minor device #'s for accessing logs */
462229997Sken#define	IPL_LOGNAT	1
463229997Sken#define	IPL_LOGSTATE	2
464229997Sken#define	IPL_LOGAUTH	3
465229997Sken#define	IPL_LOGMAX	3
466229997Sken
467229997Sken#if !defined(CDEV_MAJOR) && defined (__FreeBSD_version) && \
468229997Sken    (__FreeBSD_version >= 220000)
469229997Sken# define	CDEV_MAJOR	79
470229997Sken#endif
471229997Sken
472229997Sken/*
473229997Sken * Post NetBSD 1.2 has the PFIL interface for packet filters.  This turns
474287499Smav * on those hooks.  We don't need any special mods in non-IP Filter code
475229997Sken * with this!
476229997Sken */
477229997Sken#if (defined(NetBSD) && (NetBSD > 199609) && (NetBSD <= 1991011)) || \
478229997Sken    (defined(NetBSD1_2) && NetBSD1_2 > 1) || (defined(__FreeBSD_version) && \
479252569Smav     (__FreeBSD_version >= 500011))
480252569Smav# if (NetBSD >= 199905)
481252569Smav#  define PFIL_HOOKS
482229997Sken# endif
483229997Sken# ifdef PFIL_HOOKS
484229997Sken#  define NETBSD_PF
485229997Sken# endif
486229997Sken#endif
487229997Sken
488229997Sken
489229997Sken#ifndef	_KERNEL
490229997Skenstruct ifnet;
491229997Skenextern	int	fr_check __P((ip_t *, int, void *, int, mb_t **));
492229997Skenextern	int	(*fr_checkp) __P((ip_t *, int, void *, int, mb_t **));
493229997Skenextern	int	send_reset __P((ip_t *, struct ifnet *));
494229997Skenextern	int	icmp_error __P((ip_t *, struct ifnet *));
495229997Skenextern	int	ipf_log __P((void));
496229997Skenextern	struct	ifnet *get_unit __P((char *, int));
497229997Sken# if defined(__NetBSD__) || defined(__OpenBSD__) || \
498229997Sken	  (_BSDI_VERSION >= 199701) || (__FreeBSD_version >= 300000)
499229997Skenextern	int	iplioctl __P((dev_t, u_long, caddr_t, int));
500229997Sken# else
501229997Skenextern	int	iplioctl __P((dev_t, int, caddr_t, int));
502229997Sken# endif
503229997Skenextern	int	iplopen __P((dev_t, int));
504229997Skenextern	int	iplclose __P((dev_t, int));
505229997Sken#else /* #ifndef _KERNEL */
506229997Sken# if defined(__NetBSD__) && defined(PFIL_HOOKS)
507229997Skenextern	void	ipfilterattach __P((int));
508264886Smav# endif
509287670Smavextern	int	iplattach __P((void));
510264886Smavextern	int	ipl_enable __P((void));
511287499Smavextern	int	ipl_disable __P((void));
512267877Smavextern	void	ipflog_init __P((void));
513229997Skenextern	int	ipflog_clear __P((minor_t));
514264886Smavextern	int	ipflog_read __P((minor_t, struct uio *));
515229997Skenextern	int	ipflog __P((u_int, ip_t *, fr_info_t *, mb_t *));
516229997Skenextern	int	ipllog __P((int, fr_info_t *, void **, size_t *, int *, int));
517229997Skenextern	int	send_icmp_err __P((ip_t *, int, fr_info_t *, int));
518229997Skenextern	int	send_reset __P((ip_t *, fr_info_t *));
519229997Sken# if	SOLARIS
520229997Skenextern	int	fr_check __P((ip_t *, int, void *, int, qif_t *, mb_t **));
521229997Skenextern	int	(*fr_checkp) __P((ip_t *, int, void *,
522229997Sken				  int, qif_t *, mb_t **));
523229997Sken#  if SOLARIS2 >= 7
524229997Skenextern	int	iplioctl __P((dev_t, int, intptr_t, int, cred_t *, int *));
525229997Sken#  else
526229997Skenextern	int	iplioctl __P((dev_t, int, int *, int, cred_t *, int *));
527229997Sken#  endif
528287499Smavextern	int	iplopen __P((dev_t *, int, int, cred_t *));
529229997Skenextern	int	iplclose __P((dev_t, int, int, cred_t *));
530229997Skenextern	int	ipfsync __P((void));
531287499Smavextern	int	ipfr_fastroute __P((ip_t *, mblk_t *, mblk_t **,
532229997Sken				    fr_info_t *, frdest_t *));
533267481Smavextern	void	copyin_mblk __P((mblk_t *, size_t, size_t, char *));
534229997Skenextern	void	copyout_mblk __P((mblk_t *, size_t, size_t, char *));
535287499Smavextern	int	fr_qin __P((queue_t *, mblk_t *));
536229997Skenextern	int	fr_qout __P((queue_t *, mblk_t *));
537229997Skenextern	int	iplread __P((dev_t, struct uio *, cred_t *));
538229997Sken# else /* SOLARIS */
539229997Skenextern	int	fr_check __P((ip_t *, int, void *, int, mb_t **));
540287499Smavextern	int	(*fr_checkp) __P((ip_t *, int, void *, int, mb_t **));
541287499Smavextern	int	ipfr_fastroute __P((mb_t *, mb_t **, fr_info_t *, frdest_t *));
542287499Smavextern	size_t	mbufchainlen __P((mb_t *));
543287500Smav#  ifdef	__sgi
544287499Smav#   include <sys/cred.h>
545264886Smavextern	int	iplioctl __P((dev_t, int, caddr_t, int, cred_t *, int *));
546287499Smavextern	int	iplopen __P((dev_t *, int, int, cred_t *));
547229997Skenextern	int	iplclose __P((dev_t, int, int, cred_t *));
548229997Skenextern	int	iplread __P((dev_t, struct uio *, cred_t *));
549287499Smavextern	int	ipfsync __P((void));
550229997Skenextern	int	ipfilter_sgi_attach __P((void));
551287499Smavextern	void	ipfilter_sgi_detach __P((void));
552287499Smavextern	void	ipfilter_sgi_intfsync __P((void));
553287621Smav#  else
554287621Smav#   ifdef	IPFILTER_LKM
555287621Smavextern	int	iplidentify __P((char *));
556287621Smav#   endif
557287621Smav#   if (_BSDI_VERSION >= 199510) || (__FreeBSD_version >= 220000) || \
558287621Smav      (NetBSD >= 199511) || defined(__OpenBSD__)
559287621Smav#    if defined(__NetBSD__) || (_BSDI_VERSION >= 199701) || \
560229997Sken       defined(__OpenBSD__) || (__FreeBSD_version >= 300000)
561287499Smavextern	int	iplioctl __P((dev_t, u_long, caddr_t, int, struct proc *));
562287499Smav#    else
563287499Smavextern	int	iplioctl __P((dev_t, int, caddr_t, int, struct proc *));
564287499Smav#    endif
565287499Smavextern	int	iplopen __P((dev_t, int, int, struct proc *));
566287499Smavextern	int	iplclose __P((dev_t, int, int, struct proc *));
567229997Sken#   else
568229997Sken#    ifndef	linux
569287499Smavextern	int	iplopen __P((dev_t, int));
570229997Skenextern	int	iplclose __P((dev_t, int));
571229997Skenextern	int	iplioctl __P((dev_t, int, caddr_t, int));
572287499Smav#    else
573287499Smavextern	int	iplioctl(struct inode *, struct file *, u_int, u_long);
574287499Smavextern	int	iplopen __P((struct inode *, struct file *));
575287499Smavextern	void	iplclose __P((struct inode *, struct file *));
576287499Smav#    endif /* !linux */
577229997Sken#   endif /* (_BSDI_VERSION >= 199510) */
578229997Sken#   if	BSD >= 199306
579229997Skenextern	int	iplread __P((dev_t, struct uio *, int));
580287499Smav#   else
581229997Sken#    ifndef linux
582229997Skenextern	int	iplread __P((dev_t, struct uio *));
583287499Smav#    else
584267481Smavextern	int	iplread(struct inode *, struct file *, char *, int);
585287499Smav#    endif /* !linux */
586287499Smav#   endif /* BSD >= 199306 */
587287499Smav#  endif /* __ sgi */
588287499Smav# endif /* SOLARIS */
589287499Smav#endif /* #ifndef _KERNEL */
590287499Smav
591287499Smavextern	char	*memstr __P((char *, char *, int, int));
592287499Smavextern	void	fixskip __P((frentry_t **, frentry_t *, int));
593287499Smavextern	int	countbits __P((u_32_t));
594287499Smavextern	int	ipldetach __P((void));
595287499Smavextern	u_short	ipf_cksum __P((u_short *, int));
596287499Smavextern	int	ircopyptr __P((void *, void *, size_t));
597254759Straszextern	int	iwcopyptr __P((void *, void *, size_t));
598229997Sken
599287499Smavextern	int	frflush __P((minor_t, int));
600287499Smavextern	void	frsync __P((void));
601229997Skenextern	frgroup_t *fr_addgroup __P((u_32_t, frentry_t *, minor_t, int));
602287499Smavextern	void	fr_delgroup __P((u_32_t, u_32_t, minor_t, int));
603229997Skenextern	frgroup_t *fr_findgroup __P((u_32_t, u_32_t, minor_t, int,
604287499Smav				    frgroup_t ***));
605287499Smav
606287499Smavextern	int	fr_copytolog __P((int, char *, int));
607229997Skenextern	void	fr_forgetifp __P((void *));
608229997Skenextern	void	fr_getstat __P((struct friostat *));
609229997Skenextern	int	fr_ifpaddr __P((int, void *, struct in_addr *));
610287499Smavextern	int	fr_lock __P((caddr_t, int *));
611287499Smavextern  void	fr_makefrip __P((int, ip_t *, fr_info_t *));
612229997Skenextern	u_short	fr_tcpsum __P((mb_t *, ip_t *, tcphdr_t *));
613229997Skenextern	int	fr_scanlist __P((u_32_t, ip_t *, fr_info_t *, void *));
614229997Skenextern	int	fr_tcpudpchk __P((frtuc_t *, fr_info_t *));
615275953Smavextern	int	fr_verifysrc __P((struct in_addr, void *));
616229997Sken
617287499Smavextern	int	ipl_unreach;
618287499Smavextern	int	fr_running;
619275953Smavextern	u_long	ipl_frouteok[2];
620229997Skenextern	int	fr_pass;
621229997Skenextern	int	fr_flags;
622229997Skenextern	int	fr_active;
623287499Smavextern	int	fr_chksrc;
624287499Smavextern	int	fr_minttl;
625229997Skenextern	int	fr_minttllog;
626229997Skenextern	fr_info_t	frcache[2];
627229997Skenextern	char	ipfilter_version[];
628275953Smavextern	iplog_t	**iplh[IPL_LOGMAX+1], *iplt[IPL_LOGMAX+1];
629229997Skenextern	size_t	iplused[IPL_LOGMAX + 1];
630287499Smavextern	struct frentry *ipfilter[2][2], *ipacct[2][2];
631287499Smav#ifdef	USE_INET6
632275953Smavextern	struct frentry *ipfilter6[2][2], *ipacct6[2][2];
633229997Skenextern	int	icmptoicmp6types[ICMP_MAXTYPE+1];
634229997Skenextern	int	icmptoicmp6unreach[ICMP_MAX_UNREACH];
635264886Smav#endif
636267877Smavextern	struct frgroup *ipfgroups[3][2];
637264886Smavextern	struct filterstats frstats[];
638264886Smav
639264886Smav#endif	/* __IP_FIL_H__ */
640264886Smav