ip_fil.h revision 53642
1/*
2 * Copyright (C) 1993-1998 by Darren Reed.
3 *
4 * Redistribution and use in source and binary forms are permitted
5 * provided that this notice is preserved and due credit is given
6 * to the original author and the contributors.
7 *
8 * @(#)ip_fil.h	1.35 6/5/96
9 * $Id: ip_fil.h,v 2.3.2.4 1999/10/15 13:42:37 darrenr Exp $
10 * $FreeBSD: head/sys/contrib/ipfilter/netinet/ip_fil.h 53642 1999-11-23 21:44:59Z guido $
11 */
12
13#ifndef	__IP_FIL_H__
14#define	__IP_FIL_H__
15
16/*
17 * Pathnames for various IP Filter control devices.  Used by LKM
18 * and userland, so defined here.
19 */
20#define	IPNAT_NAME	"/dev/ipnat"
21#define	IPSTATE_NAME	"/dev/ipstate"
22#define	IPAUTH_NAME	"/dev/ipauth"
23
24#ifndef	SOLARIS
25# define SOLARIS (defined(sun) && (defined(__svr4__) || defined(__SVR4)))
26#endif
27
28#if defined(KERNEL) && !defined(_KERNEL)
29# define	_KERNEL
30#endif
31
32#ifndef	__P
33# ifdef	__STDC__
34#  define	__P(x)	x
35# else
36#  define	__P(x)	()
37# endif
38#endif
39
40#if defined(__STDC__) || defined(__GNUC__)
41# define	SIOCADAFR	_IOW('r', 60, struct frentry)
42# define	SIOCRMAFR	_IOW('r', 61, struct frentry)
43# define	SIOCSETFF	_IOW('r', 62, u_int)
44# define	SIOCGETFF	_IOR('r', 63, u_int)
45# define	SIOCGETFS	_IOR('r', 64, struct friostat)
46# define	SIOCIPFFL	_IOWR('r', 65, int)
47# define	SIOCIPFFB	_IOR('r', 66, int)
48# define	SIOCADIFR	_IOW('r', 67, struct frentry)
49# define	SIOCRMIFR	_IOW('r', 68, struct frentry)
50# define	SIOCSWAPA	_IOR('r', 69, u_int)
51# define	SIOCINAFR	_IOW('r', 70, struct frentry)
52# define	SIOCINIFR	_IOW('r', 71, struct frentry)
53# define	SIOCFRENB	_IOW('r', 72, u_int)
54# define	SIOCFRSYN	_IOW('r', 73, u_int)
55# define	SIOCFRZST	_IOWR('r', 74, struct friostat)
56# define	SIOCZRLST	_IOWR('r', 75, struct frentry)
57# define	SIOCAUTHW	_IOWR('r', 76, struct fr_info)
58# define	SIOCAUTHR	_IOWR('r', 77, struct fr_info)
59# define	SIOCATHST	_IOWR('r', 78, struct fr_authstat)
60#else
61# define	SIOCADAFR	_IOW(r, 60, struct frentry)
62# define	SIOCRMAFR	_IOW(r, 61, struct frentry)
63# define	SIOCSETFF	_IOW(r, 62, u_int)
64# define	SIOCGETFF	_IOR(r, 63, u_int)
65# define	SIOCGETFS	_IOR(r, 64, struct friostat)
66# define	SIOCIPFFL	_IOWR(r, 65, int)
67# define	SIOCIPFFB	_IOR(r, 66, int)
68# define	SIOCADIFR	_IOW(r, 67, struct frentry)
69# define	SIOCRMIFR	_IOW(r, 68, struct frentry)
70# define	SIOCSWAPA	_IOR(r, 69, u_int)
71# define	SIOCINAFR	_IOW(r, 70, struct frentry)
72# define	SIOCINIFR	_IOW(r, 71, struct frentry)
73# define	SIOCFRENB	_IOW(r, 72, u_int)
74# define	SIOCFRSYN	_IOW(r, 73, u_int)
75# define	SIOCFRZST	_IOWR(r, 74, struct friostat)
76# define	SIOCZRLST	_IOWR(r, 75, struct frentry)
77# define	SIOCAUTHW	_IOWR(r, 76, struct fr_info)
78# define	SIOCAUTHR	_IOWR(r, 77, struct fr_info)
79# define	SIOCATHST	_IOWR(r, 78, struct fr_authstat)
80#endif
81#define	SIOCADDFR	SIOCADAFR
82#define	SIOCDELFR	SIOCRMAFR
83#define	SIOCINSFR	SIOCINAFR
84
85typedef	struct	fr_ip	{
86	u_char	fi_v:4;		/* IP version */
87	u_char	fi_fl:4;	/* packet flags */
88	u_char	fi_tos;		/* IP packet TOS */
89	u_char	fi_ttl;		/* IP packet TTL */
90	u_char	fi_p;		/* IP packet protocol */
91	struct	in_addr	fi_src;	/* source address from packet */
92	struct	in_addr	fi_dst;	/* destination address from packet */
93	u_32_t	fi_optmsk;	/* bitmask composed from IP options */
94	u_short	fi_secmsk;	/* bitmask composed from IP security options */
95	u_short	fi_auth;	/* authentication code from IP sec. options */
96} fr_ip_t;
97
98#define	FI_OPTIONS	(FF_OPTIONS >> 24)
99#define	FI_TCPUDP	(FF_TCPUDP >> 24)	/* TCP/UCP implied comparison*/
100#define	FI_FRAG		(FF_FRAG >> 24)
101#define	FI_SHORT	(FF_SHORT >> 24)
102#define	FI_CMP		(FI_OPTIONS|FI_TCPUDP|FI_SHORT)
103
104/*
105 * These are both used by the state and NAT code to indicate that one port or
106 * the other should be treated as a wildcard.
107 */
108#define	FI_W_SPORT	0x00000100
109#define	FI_W_DPORT	0x00000200
110
111typedef	struct	fr_info	{
112	void	*fin_ifp;		/* interface packet is `on' */
113	struct	fr_ip	fin_fi;		/* IP Packet summary */
114	u_short	fin_data[2];		/* TCP/UDP ports, ICMP code/type */
115	u_char	fin_out;		/* in or out ? 1 == out, 0 == in */
116	u_char	fin_rev;		/* state only: 1 = reverse */
117	u_short	fin_hlen;		/* length of IP header in bytes */
118	u_char	fin_tcpf;		/* TCP header flags (SYN, ACK, etc) */
119	/* From here on is packet specific */
120	u_char	fin_icode;		/* ICMP error to return */
121	u_short	fin_rule;		/* rule # last matched */
122	u_short	fin_group;		/* group number, -1 for none */
123	struct	frentry *fin_fr;	/* last matching rule */
124	char	*fin_dp;		/* start of data past IP header */
125	u_short	fin_dlen;		/* length of data portion of packet */
126	u_short	fin_id;			/* IP packet id field */
127	void	*fin_mp;		/* pointer to pointer to mbuf */
128#if SOLARIS && defined(_KERNEL)
129	void	*fin_qfm;		/* pointer to mblk where pkt starts */
130	void	*fin_qif;
131#endif
132} fr_info_t;
133
134/*
135 * Size for compares on fr_info structures
136 */
137#define	FI_CSIZE	offsetof(fr_info_t, fin_icode)
138
139/*
140 * Size for copying cache fr_info structure
141 */
142#define	FI_COPYSIZE	offsetof(fr_info_t, fin_dp)
143
144typedef	struct	frdest	{
145	void	*fd_ifp;
146	struct	in_addr	fd_ip;
147	char	fd_ifname[IFNAMSIZ];
148} frdest_t;
149
150typedef	struct	frentry {
151	struct	frentry	*fr_next;
152	u_short	fr_group;	/* group to which this rule belongs */
153	u_short	fr_grhead;	/* group # which this rule starts */
154	struct	frentry	*fr_grp;
155	int	fr_ref;		/* reference count - for grouping */
156	void	*fr_ifa;
157#if BSD >= 199306
158	void	*fr_oifa;
159#endif
160	/*
161	 * These are only incremented when a packet  matches this rule and
162	 * it is the last match
163	 */
164	U_QUAD_T	fr_hits;
165	U_QUAD_T	fr_bytes;
166	/*
167	 * Fields after this may not change whilst in the kernel.
168	 */
169	struct	fr_ip	fr_ip;
170	struct	fr_ip	fr_mip;	/* mask structure */
171
172	u_char	fr_tcpfm;	/* tcp flags mask */
173	u_char	fr_tcpf;	/* tcp flags */
174
175	u_short	fr_icmpm;	/* data for ICMP packets (mask) */
176	u_short	fr_icmp;
177
178	u_char	fr_scmp;	/* data for port comparisons */
179	u_char	fr_dcmp;
180	u_short	fr_dport;
181	u_short	fr_sport;
182	u_short	fr_stop;	/* top port for <> and >< */
183	u_short	fr_dtop;	/* top port for <> and >< */
184	u_32_t	fr_flags;	/* per-rule flags && options (see below) */
185	u_short	fr_skip;	/* # of rules to skip */
186	u_short	fr_loglevel;	/* syslog log facility + priority */
187	int	(*fr_func) __P((int, ip_t *, fr_info_t *));	/* call this function */
188	char	fr_icode;	/* return ICMP code */
189	char	fr_ifname[IFNAMSIZ];
190#if BSD >= 199306
191	char	fr_oifname[IFNAMSIZ];
192#endif
193	struct	frdest	fr_tif;	/* "to" interface */
194	struct	frdest	fr_dif;	/* duplicate packet interfaces */
195} frentry_t;
196
197#define	fr_proto	fr_ip.fi_p
198#define	fr_ttl		fr_ip.fi_ttl
199#define	fr_tos		fr_ip.fi_tos
200#define	fr_dst		fr_ip.fi_dst
201#define	fr_src		fr_ip.fi_src
202#define	fr_dmsk		fr_mip.fi_dst
203#define	fr_smsk		fr_mip.fi_src
204
205#ifndef	offsetof
206#define	offsetof(t,m)	(int)((&((t *)0L)->m))
207#endif
208#define	FR_CMPSIZ	(sizeof(struct frentry) - offsetof(frentry_t, fr_ip))
209
210/*
211 * fr_flags
212 */
213#define	FR_BLOCK	0x00001	/* do not allow packet to pass */
214#define	FR_PASS		0x00002	/* allow packet to pass */
215#define	FR_OUTQUE	0x00004	/* outgoing packets */
216#define	FR_INQUE	0x00008	/* ingoing packets */
217#define	FR_LOG		0x00010	/* Log */
218#define	FR_LOGB		0x00011	/* Log-fail */
219#define	FR_LOGP		0x00012	/* Log-pass */
220#define	FR_LOGBODY	0x00020	/* Log the body */
221#define	FR_LOGFIRST	0x00040	/* Log the first byte if state held */
222#define	FR_RETRST	0x00080	/* Return TCP RST packet - reset connection */
223#define	FR_RETICMP	0x00100	/* Return ICMP unreachable packet */
224#define	FR_FAKEICMP	0x00180	/* Return ICMP unreachable with fake source */
225#define	FR_NOMATCH	0x00200	/* no match occured */
226#define	FR_ACCOUNT	0x00400	/* count packet bytes */
227#define	FR_KEEPFRAG	0x00800	/* keep fragment information */
228#define	FR_KEEPSTATE	0x01000	/* keep `connection' state information */
229#define	FR_INACTIVE	0x02000
230#define	FR_QUICK	0x04000	/* match & stop processing list */
231#define	FR_FASTROUTE	0x08000	/* bypass normal routing */
232#define	FR_CALLNOW	0x10000	/* call another function (fr_func) if matches */
233#define	FR_DUP		0x20000	/* duplicate packet */
234#define	FR_LOGORBLOCK	0x40000	/* block the packet if it can't be logged */
235#define	FR_NOTSRCIP	0x80000	/* not the src IP# */
236#define	FR_NOTDSTIP	0x100000	/* not the dst IP# */
237#define	FR_AUTH		0x200000	/* use authentication */
238#define	FR_PREAUTH	0x400000	/* require preauthentication */
239#define	FR_DONTCACHE	0x800000	/* don't cache the result */
240
241#define	FR_LOGMASK	(FR_LOG|FR_LOGP|FR_LOGB)
242#define	FR_RETMASK	(FR_RETICMP|FR_RETRST|FR_FAKEICMP)
243
244/*
245 * These correspond to #define's for FI_* and are stored in fr_flags
246 */
247#define	FF_OPTIONS	0x01000000
248#define	FF_TCPUDP	0x02000000
249#define	FF_FRAG		0x04000000
250#define	FF_SHORT	0x08000000
251/*
252 * recognized flags for SIOCGETFF and SIOCSETFF, and get put in fr_flags
253 */
254#define	FF_LOGPASS	0x10000000
255#define	FF_LOGBLOCK	0x20000000
256#define	FF_LOGNOMATCH	0x40000000
257#define	FF_LOGGING	(FF_LOGPASS|FF_LOGBLOCK|FF_LOGNOMATCH)
258#define	FF_BLOCKNONIP	0x80000000	/* Solaris2 Only */
259
260#define	FR_NONE 0
261#define	FR_EQUAL 1
262#define	FR_NEQUAL 2
263#define FR_LESST 3
264#define FR_GREATERT 4
265#define FR_LESSTE 5
266#define FR_GREATERTE 6
267#define	FR_OUTRANGE 7
268#define	FR_INRANGE 8
269
270typedef	struct	filterstats {
271	u_long	fr_pass;	/* packets allowed */
272	u_long	fr_block;	/* packets denied */
273	u_long	fr_nom;		/* packets which don't match any rule */
274	u_long	fr_ppkl;	/* packets allowed and logged */
275	u_long	fr_bpkl;	/* packets denied and logged */
276	u_long	fr_npkl;	/* packets unmatched and logged */
277	u_long	fr_pkl;		/* packets logged */
278	u_long	fr_skip;	/* packets to be logged but buffer full */
279	u_long	fr_ret;		/* packets for which a return is sent */
280	u_long	fr_acct;	/* packets for which counting was performed */
281	u_long	fr_bnfr;	/* bad attempts to allocate fragment state */
282	u_long	fr_nfr;		/* new fragment state kept */
283	u_long	fr_cfr;		/* add new fragment state but complete pkt */
284	u_long	fr_bads;	/* bad attempts to allocate packet state */
285	u_long	fr_ads;		/* new packet state kept */
286	u_long	fr_chit;	/* cached hit */
287	u_long	fr_tcpbad;	/* TCP checksum check failures */
288	u_long	fr_pull[2];	/* good and bad pullup attempts */
289#if SOLARIS
290	u_long	fr_notdata;	/* PROTO/PCPROTO that have no data */
291	u_long	fr_nodata;	/* mblks that have no data */
292	u_long	fr_bad;		/* bad IP packets to the filter */
293	u_long	fr_notip;	/* packets passed through no on ip queue */
294	u_long	fr_drop;	/* packets dropped - no info for them! */
295#endif
296} filterstats_t;
297
298/*
299 * For SIOCGETFS
300 */
301typedef	struct	friostat	{
302	struct	filterstats	f_st[2];
303	struct	frentry		*f_fin[2];
304	struct	frentry		*f_fout[2];
305	struct	frentry		*f_acctin[2];
306	struct	frentry		*f_acctout[2];
307	struct	frentry		*f_auth;
308	struct	frgroup		*f_groups[3][2];
309	u_long	f_froute[2];
310	int	f_active;	/* 1 or 0 - active rule set */
311	int	f_defpass;	/* default pass - from fr_pass */
312	int	f_running;	/* 1 if running, else 0 */
313	int	f_logging;	/* 1 if enabled, else 0 */
314	char	f_version[32];	/* version string */
315} friostat_t;
316
317typedef struct	optlist {
318	u_short ol_val;
319	int	ol_bit;
320} optlist_t;
321
322
323/*
324 * Group list structure.
325 */
326typedef	struct frgroup {
327	u_short	fg_num;
328	struct	frgroup	*fg_next;
329	struct	frentry	*fg_head;
330	struct	frentry	**fg_start;
331} frgroup_t;
332
333
334/*
335 * Log structure.  Each packet header logged is prepended by one of these.
336 * Following this in the log records read from the device will be an ipflog
337 * structure which is then followed by any packet data.
338 */
339typedef	struct	iplog	{
340	u_32_t	ipl_magic;
341	u_int	ipl_count;
342	u_long	ipl_sec;
343	u_long	ipl_usec;
344	size_t	ipl_dsize;
345	struct	iplog	*ipl_next;
346} iplog_t;
347
348#define IPL_MAGIC 0x49504c4d /* 'IPLM' */
349
350typedef	struct	ipflog	{
351#if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199603)) || \
352        (defined(OpenBSD) && (OpenBSD >= 199603))
353	u_char	fl_ifname[IFNAMSIZ];
354#else
355	u_int	fl_unit;
356	u_char	fl_ifname[4];
357#endif
358	u_char	fl_plen;	/* extra data after hlen */
359	u_char	fl_hlen;	/* length of IP headers saved */
360	u_short	fl_rule;	/* assume never more than 64k rules, total */
361	u_short	fl_group;
362	u_short	fl_loglevel;	/* syslog log level */
363	u_32_t	fl_flags;
364	u_32_t	fl_lflags;
365} ipflog_t;
366
367
368#ifndef	ICMP_UNREACH_FILTER
369# define	ICMP_UNREACH_FILTER	13
370#endif
371
372#ifndef	IPF_LOGGING
373# define	IPF_LOGGING	0
374#endif
375#ifndef	IPF_DEFAULT_PASS
376# define	IPF_DEFAULT_PASS	FR_PASS
377#endif
378
379#define	IPMINLEN(i, h)	((i)->ip_len >= ((i)->ip_hl * 4 + sizeof(struct h)))
380#define	IPLLOGSIZE	8192
381
382/*
383 * Device filenames for reading log information.  Use ipf on Solaris2 because
384 * ipl is already a name used by something else.
385 */
386#ifndef	IPL_NAME
387# if	SOLARIS
388#  define	IPL_NAME	"/dev/ipf"
389# else
390#  define	IPL_NAME	"/dev/ipl"
391# endif
392#endif
393#define	IPL_NAT		IPNAT_NAME
394#define	IPL_STATE	IPSTATE_NAME
395#define	IPL_AUTH	IPAUTH_NAME
396
397#define	IPL_LOGIPF	0	/* Minor device #'s for accessing logs */
398#define	IPL_LOGNAT	1
399#define	IPL_LOGSTATE	2
400#define	IPL_LOGAUTH	3
401#define	IPL_LOGMAX	3
402
403#if !defined(CDEV_MAJOR) && defined (__FreeBSD_version) && \
404    (__FreeBSD_version >= 220000)
405# define	CDEV_MAJOR	79
406#endif
407
408/*
409 * Post NetBSD 1.2 has the PFIL interface for packet filters.  This turns
410 * on those hooks.  We don't need any special mods in non-IP Filter code
411 * with this!
412 */
413#if (defined(NetBSD) && (NetBSD > 199609) && (NetBSD <= 1991011)) || \
414    (defined(NetBSD1_2) && NetBSD1_2 > 1)
415# if (NetBSD >= 199905)
416#  define PFIL_HOOKS
417# endif
418# ifdef PFIL_HOOKS
419#  define NETBSD_PF
420# endif
421#endif
422
423
424#ifndef	_KERNEL
425extern	int	fr_check __P((ip_t *, int, void *, int, mb_t **));
426extern	int	(*fr_checkp) __P((ip_t *, int, void *, int, mb_t **));
427extern	int	send_reset __P((ip_t *, struct ifnet *));
428extern	int	icmp_error __P((ip_t *, struct ifnet *));
429extern	int	ipf_log __P((void));
430extern	int	ipfr_fastroute __P((ip_t *, fr_info_t *, frdest_t *));
431extern	struct	ifnet *get_unit __P((char *));
432# if defined(__NetBSD__) || defined(__OpenBSD__) || \
433	  (_BSDI_VERSION >= 199701) || (__FreeBSD_version >= 300000)
434extern	int	iplioctl __P((dev_t, u_long, caddr_t, int));
435# else
436extern	int	iplioctl __P((dev_t, int, caddr_t, int));
437# endif
438extern	int	iplopen __P((dev_t, int));
439extern	int	iplclose __P((dev_t, int));
440#else /* #ifndef _KERNEL */
441# if defined(__NetBSD__) && defined(PFIL_HOOKS)
442extern	void	ipfilterattach __P((int));
443# endif
444extern	int	iplattach __P((void));
445extern	int	ipl_enable __P((void));
446extern	int	ipl_disable __P((void));
447extern	void	ipflog_init __P((void));
448extern	int	ipflog_clear __P((minor_t));
449extern	int	ipflog_read __P((minor_t, struct uio *));
450extern	int	ipflog __P((u_int, ip_t *, fr_info_t *, mb_t *));
451extern	int	ipllog __P((int, fr_info_t *, void **, size_t *, int *, int));
452# if	SOLARIS
453extern	int	fr_check __P((ip_t *, int, void *, int, qif_t *, mb_t **));
454extern	int	(*fr_checkp) __P((ip_t *, int, void *,
455				  int, qif_t *, mb_t **));
456extern	int	icmp_error __P((ip_t *, int, int, qif_t *, struct in_addr));
457#  if SOLARIS2 >= 7
458extern	int	iplioctl __P((dev_t, int, intptr_t, int, cred_t *, int *));
459#  else
460extern	int	iplioctl __P((dev_t, int, int *, int, cred_t *, int *));
461#  endif
462extern	int	iplopen __P((dev_t *, int, int, cred_t *));
463extern	int	iplclose __P((dev_t, int, int, cred_t *));
464extern	int	ipfsync __P((void));
465extern	int	send_reset __P((fr_info_t *, ip_t *, qif_t *));
466extern	int	ipfr_fastroute __P((qif_t *, ip_t *, mblk_t *, mblk_t **,
467				   fr_info_t *, frdest_t *));
468extern	void	copyin_mblk __P((mblk_t *, size_t, size_t, char *));
469extern	void	copyout_mblk __P((mblk_t *, size_t, size_t, char *));
470extern	int	fr_qin __P((queue_t *, mblk_t *));
471extern	int	fr_qout __P((queue_t *, mblk_t *));
472#  ifdef	IPFILTER_LOG
473extern	int	iplread __P((dev_t, struct uio *, cred_t *));
474#  endif
475# else /* SOLARIS */
476extern	int	fr_check __P((ip_t *, int, void *, int, mb_t **));
477extern	int	(*fr_checkp) __P((ip_t *, int, void *, int, mb_t **));
478#  ifdef	linux
479extern	int	send_reset __P((tcpiphdr_t *, struct ifnet *));
480#  else
481extern	int	send_reset __P((fr_info_t *, struct ip *));
482extern	int	send_icmp_err __P((ip_t *, int, int, void *, struct in_addr));
483#  endif
484extern	int	ipfr_fastroute __P((mb_t *, fr_info_t *, frdest_t *));
485extern	size_t	mbufchainlen __P((mb_t *));
486#  ifdef	__sgi
487#   include <sys/cred.h>
488extern	int	iplioctl __P((dev_t, int, caddr_t, int, cred_t *, int *));
489extern	int	iplopen __P((dev_t *, int, int, cred_t *));
490extern	int	iplclose __P((dev_t, int, int, cred_t *));
491extern	int	iplread __P((dev_t, struct uio *, cred_t *));
492extern	int	ipfsync __P((void));
493extern	int	ipfilter_sgi_attach __P((void));
494extern	void	ipfilter_sgi_detach __P((void));
495extern	void	ipfilter_sgi_intfsync __P((void));
496#  else
497#   ifdef	IPFILTER_LKM
498extern	int	iplidentify __P((char *));
499#   endif
500#   if (_BSDI_VERSION >= 199510) || (__FreeBSD_version >= 220000) || \
501      (NetBSD >= 199511) || defined(__OpenBSD__)
502#    if defined(__NetBSD__) || (_BSDI_VERSION >= 199701) || \
503       defined(__OpenBSD__) || (__FreeBSD_version >= 300000)
504extern	int	iplioctl __P((dev_t, u_long, caddr_t, int, struct proc *));
505#    else
506extern	int	iplioctl __P((dev_t, int, caddr_t, int, struct proc *));
507#    endif
508extern	int	iplopen __P((dev_t, int, int, struct proc *));
509extern	int	iplclose __P((dev_t, int, int, struct proc *));
510#   else
511#    ifndef	linux
512extern	int	iplopen __P((dev_t, int));
513extern	int	iplclose __P((dev_t, int));
514extern	int	iplioctl __P((dev_t, int, caddr_t, int));
515#    else
516extern	int	iplioctl(struct inode *, struct file *, u_int, u_long);
517extern	int	iplopen __P((struct inode *, struct file *));
518extern	void	iplclose __P((struct inode *, struct file *));
519#    endif /* !linux */
520#   endif /* (_BSDI_VERSION >= 199510) */
521#   if	BSD >= 199306
522extern	int	iplread __P((dev_t, struct uio *, int));
523#   else
524#    ifndef linux
525extern	int	iplread __P((dev_t, struct uio *));
526#    else
527extern	int	iplread(struct inode *, struct file *, char *, int);
528#    endif /* !linux */
529#   endif /* BSD >= 199306 */
530#  endif /* __ sgi */
531# endif /* SOLARIS */
532#endif /* #ifndef _KERNEL */
533
534extern	void	fixskip __P((frentry_t **, frentry_t *, int));
535extern	int	countbits __P((u_32_t));
536extern	int	ipldetach __P((void));
537extern	u_short	fr_tcpsum __P((mb_t *, ip_t *, tcphdr_t *));
538extern	int	fr_scanlist __P((u_32_t, ip_t *, fr_info_t *, void *));
539extern	u_short	ipf_cksum __P((u_short *, int));
540extern	int	fr_copytolog __P((int, char *, int));
541extern	void	fr_forgetifp __P((void *));
542extern	int	frflush __P((minor_t, int));
543extern	void	frsync __P((void));
544extern	frgroup_t *fr_addgroup __P((u_int, frentry_t *, minor_t, int));
545extern	frgroup_t *fr_findgroup __P((u_int, u_32_t, minor_t, int, frgroup_t ***));
546extern	void	fr_delgroup __P((u_int, u_32_t, minor_t, int));
547extern  void	fr_makefrip __P((int, ip_t *, fr_info_t *));
548extern	int	fr_ifpaddr __P((void *, struct in_addr *));
549extern	char	*memstr __P((char *, char *, int, int));
550extern	int	ipl_unreach;
551extern	int	ipl_inited;
552extern	u_long	ipl_frouteok[2];
553extern	int	fr_pass;
554extern	int	fr_flags;
555extern	int	fr_active;
556extern	fr_info_t	frcache[2];
557extern	char	ipfilter_version[];
558#ifdef	IPFILTER_LOG
559extern	iplog_t	**iplh[IPL_LOGMAX+1], *iplt[IPL_LOGMAX+1];
560extern	size_t	iplused[IPL_LOGMAX + 1];
561#endif
562extern	struct frentry *ipfilter[2][2], *ipacct[2][2];
563extern	struct frgroup *ipfgroups[3][2];
564extern	struct filterstats frstats[];
565
566#endif	/* __IP_FIL_H__ */
567