ip_fil.h revision 64060
1/* 2 * Copyright (C) 1993-2000 by Darren Reed. 3 * 4 * Redistribution and use in source and binary forms are permitted 5 * provided that this notice is preserved and due credit is given 6 * to the original author and the contributors. 7 * 8 * @(#)ip_fil.h 1.35 6/5/96 9 * $Id: ip_fil.h,v 2.29.2.3 2000/06/05 13:12:42 darrenr Exp $ 10 * $FreeBSD: head/sys/contrib/ipfilter/netinet/ip_fil.h 64060 2000-07-31 13:11:42Z darrenr $ 11 */ 12 13#ifndef __IP_FIL_H__ 14#define __IP_FIL_H__ 15 16/* 17 * Pathnames for various IP Filter control devices. Used by LKM 18 * and userland, so defined here. 19 */ 20#define IPNAT_NAME "/dev/ipnat" 21#define IPSTATE_NAME "/dev/ipstate" 22#define IPAUTH_NAME "/dev/ipauth" 23 24#ifndef SOLARIS 25# define SOLARIS (defined(sun) && (defined(__svr4__) || defined(__SVR4))) 26#endif 27 28#if defined(KERNEL) && !defined(_KERNEL) 29# define _KERNEL 30#endif 31 32#ifndef __P 33# ifdef __STDC__ 34# define __P(x) x 35# else 36# define __P(x) () 37# endif 38#endif 39 40#if defined(__STDC__) || defined(__GNUC__) 41# define SIOCADAFR _IOW('r', 60, struct frentry *) 42# define SIOCRMAFR _IOW('r', 61, struct frentry *) 43# define SIOCSETFF _IOW('r', 62, u_int) 44# define SIOCGETFF _IOR('r', 63, u_int) 45# define SIOCGETFS _IOWR('r', 64, struct friostat *) 46# define SIOCIPFFL _IOWR('r', 65, int) 47# define SIOCIPFFB _IOR('r', 66, int) 48# define SIOCADIFR _IOW('r', 67, struct frentry *) 49# define SIOCRMIFR _IOW('r', 68, struct frentry *) 50# define SIOCSWAPA _IOR('r', 69, u_int) 51# define SIOCINAFR _IOW('r', 70, struct frentry *) 52# define SIOCINIFR _IOW('r', 71, struct frentry *) 53# define SIOCFRENB _IOW('r', 72, u_int) 54# define SIOCFRSYN _IOW('r', 73, u_int) 55# define SIOCFRZST _IOWR('r', 74, struct friostat *) 56# define SIOCZRLST _IOWR('r', 75, struct frentry *) 57# define SIOCAUTHW _IOWR('r', 76, struct fr_info *) 58# define SIOCAUTHR _IOWR('r', 77, struct fr_info *) 59# define SIOCATHST _IOWR('r', 78, struct fr_authstat *) 60# define SIOCSTLCK _IOWR('r', 79, u_int) 61# define SIOCSTPUT _IOWR('r', 80, struct ipstate_save *) 62# define SIOCSTGET _IOWR('r', 81, struct ipstate_save *) 63# define SIOCSTGSZ _IOWR('r', 82, struct natget *) 64# define SIOCGFRST _IOWR('r', 83, struct ipfrstat *) 65#else 66# define SIOCADAFR _IOW(r, 60, struct frentry *) 67# define SIOCRMAFR _IOW(r, 61, struct frentry *) 68# define SIOCSETFF _IOW(r, 62, u_int) 69# define SIOCGETFF _IOR(r, 63, u_int) 70# define SIOCGETFS _IOWR(r, 64, struct friostat *) 71# define SIOCIPFFL _IOWR(r, 65, int) 72# define SIOCIPFFB _IOR(r, 66, int) 73# define SIOCADIFR _IOW(r, 67, struct frentry *) 74# define SIOCRMIFR _IOW(r, 68, struct frentry *) 75# define SIOCSWAPA _IOR(r, 69, u_int) 76# define SIOCINAFR _IOW(r, 70, struct frentry *) 77# define SIOCINIFR _IOW(r, 71, struct frentry *) 78# define SIOCFRENB _IOW(r, 72, u_int) 79# define SIOCFRSYN _IOW(r, 73, u_int) 80# define SIOCFRZST _IOWR(r, 74, struct friostat *) 81# define SIOCZRLST _IOWR(r, 75, struct frentry *) 82# define SIOCAUTHW _IOWR(r, 76, struct fr_info *) 83# define SIOCAUTHR _IOWR(r, 77, struct fr_info *) 84# define SIOCATHST _IOWR(r, 78, struct fr_authstat *) 85# define SIOCSTLCK _IOWR(r, 79, u_int) 86# define SIOCSTPUT _IOWR(r, 80, struct ipstate_save *) 87# define SIOCSTGET _IOWR(r, 81, struct ipstate_save *) 88# define SIOCSTGSZ _IOWR(r, 82, struct natget *) 89# define SIOCGFRST _IOWR(r, 83, struct ipfrstat *) 90#endif 91#define SIOCADDFR SIOCADAFR 92#define SIOCDELFR SIOCRMAFR 93#define SIOCINSFR SIOCINAFR 94 95 96typedef struct fr_ip { 97 u_32_t fi_v:4; /* IP version */ 98 u_32_t fi_fl:4; /* packet flags */ 99 u_32_t fi_tos:8; /* IP packet TOS */ 100 u_32_t fi_ttl:8; /* IP packet TTL */ 101 u_32_t fi_p:8; /* IP packet protocol */ 102 union i6addr fi_src; /* source address from packet */ 103 union i6addr fi_dst; /* destination address from packet */ 104 u_32_t fi_optmsk; /* bitmask composed from IP options */ 105 u_short fi_secmsk; /* bitmask composed from IP security options */ 106 u_short fi_auth; /* authentication code from IP sec. options */ 107} fr_ip_t; 108 109#define FI_OPTIONS (FF_OPTIONS >> 24) 110#define FI_TCPUDP (FF_TCPUDP >> 24) /* TCP/UCP implied comparison*/ 111#define FI_FRAG (FF_FRAG >> 24) 112#define FI_SHORT (FF_SHORT >> 24) 113#define FI_CMP (FI_OPTIONS|FI_TCPUDP|FI_SHORT) 114 115#define fi_saddr fi_src.in4.s_addr 116#define fi_daddr fi_dst.in4.s_addr 117 118 119/* 120 * These are both used by the state and NAT code to indicate that one port or 121 * the other should be treated as a wildcard. 122 */ 123#define FI_W_SPORT 0x00000100 124#define FI_W_DPORT 0x00000200 125#define FI_WILDP (FI_W_SPORT|FI_W_DPORT) 126#define FI_W_SADDR 0x00000400 127#define FI_W_DADDR 0x00000800 128#define FI_WILDA (FI_W_SADDR|FI_W_DADDR) 129#define FI_NEWFR 0x00001000 130 131typedef struct fr_info { 132 void *fin_ifp; /* interface packet is `on' */ 133 struct fr_ip fin_fi; /* IP Packet summary */ 134 u_short fin_data[2]; /* TCP/UDP ports, ICMP code/type */ 135 u_char fin_out; /* in or out ? 1 == out, 0 == in */ 136 u_char fin_rev; /* state only: 1 = reverse */ 137 u_short fin_hlen; /* length of IP header in bytes */ 138 u_char fin_tcpf; /* TCP header flags (SYN, ACK, etc) */ 139 /* From here on is packet specific */ 140 u_char fin_icode; /* ICMP error to return */ 141 u_short fin_rule; /* rule # last matched */ 142 u_32_t fin_group; /* group number, -1 for none */ 143 struct frentry *fin_fr; /* last matching rule */ 144 char *fin_dp; /* start of data past IP header */ 145 u_short fin_dlen; /* length of data portion of packet */ 146 u_short fin_id; /* IP packet id field */ 147 void *fin_mp; /* pointer to pointer to mbuf */ 148#if SOLARIS 149 void *fin_qfm; /* pointer to mblk where pkt starts */ 150 void *fin_qif; 151#endif 152 u_short fin_plen; 153 u_short fin_off; 154} fr_info_t; 155 156#define fin_v fin_fi.fi_v 157 158/* 159 * Size for compares on fr_info structures 160 */ 161#define FI_CSIZE offsetof(fr_info_t, fin_icode) 162 163/* 164 * Size for copying cache fr_info structure 165 */ 166#define FI_COPYSIZE offsetof(fr_info_t, fin_dp) 167 168typedef struct frdest { 169 void *fd_ifp; 170 struct in_addr fd_ip; 171 char fd_ifname[IFNAMSIZ]; 172} frdest_t; 173 174typedef struct frpcmp { 175 int frp_cmp; /* data for port comparisons */ 176 u_short frp_port; /* top port for <> and >< */ 177 u_short frp_top; /* top port for <> and >< */ 178} frpcmp_t; 179 180typedef struct frtuc { 181 u_char ftu_tcpfm; /* tcp flags mask */ 182 u_char ftu_tcpf; /* tcp flags */ 183 frpcmp_t ftu_src; 184 frpcmp_t ftu_dst; 185} frtuc_t; 186 187#define ftu_scmp ftu_src.frp_cmp 188#define ftu_dcmp ftu_dst.frp_cmp 189#define ftu_sport ftu_src.frp_port 190#define ftu_dport ftu_dst.frp_port 191#define ftu_stop ftu_src.frp_top 192#define ftu_dtop ftu_dst.frp_top 193 194typedef struct frentry { 195 struct frentry *fr_next; 196 u_32_t fr_group; /* group to which this rule belongs */ 197 u_32_t fr_grhead; /* group # which this rule starts */ 198 struct frentry *fr_grp; 199 int fr_ref; /* reference count - for grouping */ 200 void *fr_ifa; 201#if BSD >= 199306 202 void *fr_oifa; 203#endif 204 /* 205 * These are only incremented when a packet matches this rule and 206 * it is the last match 207 */ 208 U_QUAD_T fr_hits; 209 U_QUAD_T fr_bytes; 210 /* 211 * Fields after this may not change whilst in the kernel. 212 */ 213 struct fr_ip fr_ip; 214 struct fr_ip fr_mip; /* mask structure */ 215 216 217 u_short fr_icmpm; /* data for ICMP packets (mask) */ 218 u_short fr_icmp; 219 220 frtuc_t fr_tuc; 221 u_32_t fr_flags; /* per-rule flags && options (see below) */ 222 u_int fr_skip; /* # of rules to skip */ 223 u_int fr_loglevel; /* syslog log facility + priority */ 224 int (*fr_func) __P((int, ip_t *, fr_info_t *)); /* call this function */ 225 int fr_sap; /* For solaris only */ 226 u_char fr_icode; /* return ICMP code */ 227 char fr_ifname[IFNAMSIZ]; 228#if BSD >= 199306 229 char fr_oifname[IFNAMSIZ]; 230#endif 231 struct frdest fr_tif; /* "to" interface */ 232 struct frdest fr_dif; /* duplicate packet interfaces */ 233 u_int fr_cksum; /* checksum on filter rules for performance */ 234} frentry_t; 235 236#define fr_v fr_ip.fi_v 237#define fr_proto fr_ip.fi_p 238#define fr_ttl fr_ip.fi_ttl 239#define fr_tos fr_ip.fi_tos 240#define fr_tcpfm fr_tuc.ftu_tcpfm 241#define fr_tcpf fr_tuc.ftu_tcpf 242#define fr_scmp fr_tuc.ftu_scmp 243#define fr_dcmp fr_tuc.ftu_dcmp 244#define fr_dport fr_tuc.ftu_dport 245#define fr_sport fr_tuc.ftu_sport 246#define fr_stop fr_tuc.ftu_stop 247#define fr_dtop fr_tuc.ftu_dtop 248#define fr_dst fr_ip.fi_dst.in4 249#define fr_src fr_ip.fi_src.in4 250#define fr_dmsk fr_mip.fi_dst.in4 251#define fr_smsk fr_mip.fi_src.in4 252 253#ifndef offsetof 254#define offsetof(t,m) (int)((&((t *)0L)->m)) 255#endif 256#define FR_CMPSIZ (sizeof(struct frentry) - offsetof(frentry_t, fr_ip)) 257 258/* 259 * fr_flags 260 */ 261#define FR_BLOCK 0x00001 /* do not allow packet to pass */ 262#define FR_PASS 0x00002 /* allow packet to pass */ 263#define FR_OUTQUE 0x00004 /* outgoing packets */ 264#define FR_INQUE 0x00008 /* ingoing packets */ 265#define FR_LOG 0x00010 /* Log */ 266#define FR_LOGB 0x00011 /* Log-fail */ 267#define FR_LOGP 0x00012 /* Log-pass */ 268#define FR_LOGBODY 0x00020 /* Log the body */ 269#define FR_LOGFIRST 0x00040 /* Log the first byte if state held */ 270#define FR_RETRST 0x00080 /* Return TCP RST packet - reset connection */ 271#define FR_RETICMP 0x00100 /* Return ICMP unreachable packet */ 272#define FR_FAKEICMP 0x00180 /* Return ICMP unreachable with fake source */ 273#define FR_NOMATCH 0x00200 /* no match occured */ 274#define FR_ACCOUNT 0x00400 /* count packet bytes */ 275#define FR_KEEPFRAG 0x00800 /* keep fragment information */ 276#define FR_KEEPSTATE 0x01000 /* keep `connection' state information */ 277#define FR_INACTIVE 0x02000 278#define FR_QUICK 0x04000 /* match & stop processing list */ 279#define FR_FASTROUTE 0x08000 /* bypass normal routing */ 280#define FR_CALLNOW 0x10000 /* call another function (fr_func) if matches */ 281#define FR_DUP 0x20000 /* duplicate packet */ 282#define FR_LOGORBLOCK 0x40000 /* block the packet if it can't be logged */ 283#define FR_NOTSRCIP 0x80000 /* not the src IP# */ 284#define FR_NOTDSTIP 0x100000 /* not the dst IP# */ 285#define FR_AUTH 0x200000 /* use authentication */ 286#define FR_PREAUTH 0x400000 /* require preauthentication */ 287#define FR_DONTCACHE 0x800000 /* don't cache the result */ 288 289#define FR_LOGMASK (FR_LOG|FR_LOGP|FR_LOGB) 290#define FR_RETMASK (FR_RETICMP|FR_RETRST|FR_FAKEICMP) 291 292/* 293 * These correspond to #define's for FI_* and are stored in fr_flags 294 */ 295#define FF_OPTIONS 0x01000000 296#define FF_TCPUDP 0x02000000 297#define FF_FRAG 0x04000000 298#define FF_SHORT 0x08000000 299/* 300 * recognized flags for SIOCGETFF and SIOCSETFF, and get put in fr_flags 301 */ 302#define FF_LOGPASS 0x10000000 303#define FF_LOGBLOCK 0x20000000 304#define FF_LOGNOMATCH 0x40000000 305#define FF_LOGGING (FF_LOGPASS|FF_LOGBLOCK|FF_LOGNOMATCH) 306#define FF_BLOCKNONIP 0x80000000 /* Solaris2 Only */ 307 308#define FR_NONE 0 309#define FR_EQUAL 1 310#define FR_NEQUAL 2 311#define FR_LESST 3 312#define FR_GREATERT 4 313#define FR_LESSTE 5 314#define FR_GREATERTE 6 315#define FR_OUTRANGE 7 316#define FR_INRANGE 8 317 318typedef struct filterstats { 319 u_long fr_pass; /* packets allowed */ 320 u_long fr_block; /* packets denied */ 321 u_long fr_nom; /* packets which don't match any rule */ 322 u_long fr_short; /* packets which are short */ 323 u_long fr_ppkl; /* packets allowed and logged */ 324 u_long fr_bpkl; /* packets denied and logged */ 325 u_long fr_npkl; /* packets unmatched and logged */ 326 u_long fr_pkl; /* packets logged */ 327 u_long fr_skip; /* packets to be logged but buffer full */ 328 u_long fr_ret; /* packets for which a return is sent */ 329 u_long fr_acct; /* packets for which counting was performed */ 330 u_long fr_bnfr; /* bad attempts to allocate fragment state */ 331 u_long fr_nfr; /* new fragment state kept */ 332 u_long fr_cfr; /* add new fragment state but complete pkt */ 333 u_long fr_bads; /* bad attempts to allocate packet state */ 334 u_long fr_ads; /* new packet state kept */ 335 u_long fr_chit; /* cached hit */ 336 u_long fr_tcpbad; /* TCP checksum check failures */ 337 u_long fr_pull[2]; /* good and bad pullup attempts */ 338 u_long fr_badsrc; /* source received doesn't match route */ 339#if SOLARIS 340 u_long fr_notdata; /* PROTO/PCPROTO that have no data */ 341 u_long fr_nodata; /* mblks that have no data */ 342 u_long fr_bad; /* bad IP packets to the filter */ 343 u_long fr_notip; /* packets passed through no on ip queue */ 344 u_long fr_drop; /* packets dropped - no info for them! */ 345 u_long fr_copy; /* messages copied due to db_ref > 1 */ 346#endif 347 u_long fr_ipv6[2]; /* IPv6 packets in/out */ 348} filterstats_t; 349 350/* 351 * For SIOCGETFS 352 */ 353typedef struct friostat { 354 struct filterstats f_st[2]; 355 struct frentry *f_fin[2]; 356 struct frentry *f_fout[2]; 357 struct frentry *f_acctin[2]; 358 struct frentry *f_acctout[2]; 359 struct frentry *f_fin6[2]; 360 struct frentry *f_fout6[2]; 361 struct frentry *f_acctin6[2]; 362 struct frentry *f_acctout6[2]; 363 struct frentry *f_auth; 364 struct frgroup *f_groups[3][2]; 365 u_long f_froute[2]; 366 int f_defpass; /* default pass - from fr_pass */ 367 char f_active; /* 1 or 0 - active rule set */ 368 char f_running; /* 1 if running, else 0 */ 369 char f_logging; /* 1 if enabled, else 0 */ 370 char f_version[32]; /* version string */ 371 int f_locks[4]; 372} friostat_t; 373 374typedef struct optlist { 375 u_short ol_val; 376 int ol_bit; 377} optlist_t; 378 379 380/* 381 * Group list structure. 382 */ 383typedef struct frgroup { 384 u_32_t fg_num; 385 struct frgroup *fg_next; 386 struct frentry *fg_head; 387 struct frentry **fg_start; 388} frgroup_t; 389 390 391/* 392 * Log structure. Each packet header logged is prepended by one of these. 393 * Following this in the log records read from the device will be an ipflog 394 * structure which is then followed by any packet data. 395 */ 396typedef struct iplog { 397 u_32_t ipl_magic; 398 u_int ipl_count; 399 u_long ipl_sec; 400 u_long ipl_usec; 401 size_t ipl_dsize; 402 struct iplog *ipl_next; 403} iplog_t; 404 405#define IPL_MAGIC 0x49504c4d /* 'IPLM' */ 406 407typedef struct ipflog { 408#if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199603)) || \ 409 (defined(OpenBSD) && (OpenBSD >= 199603)) 410 u_char fl_ifname[IFNAMSIZ]; 411#else 412 u_int fl_unit; 413 u_char fl_ifname[4]; 414#endif 415 u_char fl_plen; /* extra data after hlen */ 416 u_char fl_hlen; /* length of IP headers saved */ 417 u_short fl_loglevel; /* syslog log level */ 418 u_32_t fl_rule; 419 u_32_t fl_group; 420 u_32_t fl_flags; 421 u_32_t fl_lflags; 422} ipflog_t; 423 424 425#ifndef ICMP_UNREACH_FILTER 426# define ICMP_UNREACH_FILTER 13 427#endif 428 429#ifndef IPF_LOGGING 430# define IPF_LOGGING 0 431#endif 432#ifndef IPF_DEFAULT_PASS 433# define IPF_DEFAULT_PASS FR_PASS 434#endif 435 436#define IPMINLEN(i, h) ((i)->ip_len >= ((i)->ip_hl * 4 + sizeof(struct h))) 437#define IPLLOGSIZE 8192 438 439/* 440 * Device filenames for reading log information. Use ipf on Solaris2 because 441 * ipl is already a name used by something else. 442 */ 443#ifndef IPL_NAME 444# if SOLARIS 445# define IPL_NAME "/dev/ipf" 446# else 447# define IPL_NAME "/dev/ipl" 448# endif 449#endif 450#define IPL_NAT IPNAT_NAME 451#define IPL_STATE IPSTATE_NAME 452#define IPL_AUTH IPAUTH_NAME 453 454#define IPL_LOGIPF 0 /* Minor device #'s for accessing logs */ 455#define IPL_LOGNAT 1 456#define IPL_LOGSTATE 2 457#define IPL_LOGAUTH 3 458#define IPL_LOGMAX 3 459 460#if !defined(CDEV_MAJOR) && defined (__FreeBSD_version) && \ 461 (__FreeBSD_version >= 220000) 462# define CDEV_MAJOR 79 463#endif 464 465/* 466 * Post NetBSD 1.2 has the PFIL interface for packet filters. This turns 467 * on those hooks. We don't need any special mods in non-IP Filter code 468 * with this! 469 */ 470#if (defined(NetBSD) && (NetBSD > 199609) && (NetBSD <= 1991011)) || \ 471 (defined(NetBSD1_2) && NetBSD1_2 > 1) || (defined(__FreeBSD_version) && \ 472 (__FreeBSD_version >= 500011)) 473# if (NetBSD >= 199905) 474# define PFIL_HOOKS 475# endif 476# ifdef PFIL_HOOKS 477# define NETBSD_PF 478# endif 479#endif 480 481 482#ifndef _KERNEL 483struct ifnet; 484extern int fr_check __P((ip_t *, int, void *, int, mb_t **)); 485extern int (*fr_checkp) __P((ip_t *, int, void *, int, mb_t **)); 486extern int send_reset __P((ip_t *, struct ifnet *)); 487extern int icmp_error __P((ip_t *, struct ifnet *)); 488extern int ipf_log __P((void)); 489extern int ipfr_fastroute __P((ip_t *, fr_info_t *, frdest_t *)); 490extern struct ifnet *get_unit __P((char *, int)); 491# if defined(__NetBSD__) || defined(__OpenBSD__) || \ 492 (_BSDI_VERSION >= 199701) || (__FreeBSD_version >= 300000) 493extern int iplioctl __P((dev_t, u_long, caddr_t, int)); 494# else 495extern int iplioctl __P((dev_t, int, caddr_t, int)); 496# endif 497extern int iplopen __P((dev_t, int)); 498extern int iplclose __P((dev_t, int)); 499#else /* #ifndef _KERNEL */ 500# if defined(__NetBSD__) && defined(PFIL_HOOKS) 501extern void ipfilterattach __P((int)); 502# endif 503extern int iplattach __P((void)); 504extern int ipl_enable __P((void)); 505extern int ipl_disable __P((void)); 506extern void ipflog_init __P((void)); 507extern int ipflog_clear __P((minor_t)); 508extern int ipflog_read __P((minor_t, struct uio *)); 509extern int ipflog __P((u_int, ip_t *, fr_info_t *, mb_t *)); 510extern int ipllog __P((int, fr_info_t *, void **, size_t *, int *, int)); 511extern int send_icmp_err __P((ip_t *, int, fr_info_t *, int)); 512extern int send_reset __P((ip_t *, fr_info_t *)); 513# if SOLARIS 514extern int fr_check __P((ip_t *, int, void *, int, qif_t *, mb_t **)); 515extern int (*fr_checkp) __P((ip_t *, int, void *, 516 int, qif_t *, mb_t **)); 517# if SOLARIS2 >= 7 518extern int iplioctl __P((dev_t, int, intptr_t, int, cred_t *, int *)); 519# else 520extern int iplioctl __P((dev_t, int, int *, int, cred_t *, int *)); 521# endif 522extern int iplopen __P((dev_t *, int, int, cred_t *)); 523extern int iplclose __P((dev_t, int, int, cred_t *)); 524extern int ipfsync __P((void)); 525extern int ipfr_fastroute __P((ip_t *, mblk_t *, mblk_t **, 526 fr_info_t *, frdest_t *)); 527extern void copyin_mblk __P((mblk_t *, size_t, size_t, char *)); 528extern void copyout_mblk __P((mblk_t *, size_t, size_t, char *)); 529extern int fr_qin __P((queue_t *, mblk_t *)); 530extern int fr_qout __P((queue_t *, mblk_t *)); 531extern int iplread __P((dev_t, struct uio *, cred_t *)); 532# else /* SOLARIS */ 533extern int fr_check __P((ip_t *, int, void *, int, mb_t **)); 534extern int (*fr_checkp) __P((ip_t *, int, void *, int, mb_t **)); 535extern int ipfr_fastroute __P((mb_t *, fr_info_t *, frdest_t *)); 536extern size_t mbufchainlen __P((mb_t *)); 537# ifdef __sgi 538# include <sys/cred.h> 539extern int iplioctl __P((dev_t, int, caddr_t, int, cred_t *, int *)); 540extern int iplopen __P((dev_t *, int, int, cred_t *)); 541extern int iplclose __P((dev_t, int, int, cred_t *)); 542extern int iplread __P((dev_t, struct uio *, cred_t *)); 543extern int ipfsync __P((void)); 544extern int ipfilter_sgi_attach __P((void)); 545extern void ipfilter_sgi_detach __P((void)); 546extern void ipfilter_sgi_intfsync __P((void)); 547# else 548# ifdef IPFILTER_LKM 549extern int iplidentify __P((char *)); 550# endif 551# if (_BSDI_VERSION >= 199510) || (__FreeBSD_version >= 220000) || \ 552 (NetBSD >= 199511) || defined(__OpenBSD__) 553# if defined(__NetBSD__) || (_BSDI_VERSION >= 199701) || \ 554 defined(__OpenBSD__) || (__FreeBSD_version >= 300000) 555extern int iplioctl __P((dev_t, u_long, caddr_t, int, struct proc *)); 556# else 557extern int iplioctl __P((dev_t, int, caddr_t, int, struct proc *)); 558# endif 559extern int iplopen __P((dev_t, int, int, struct proc *)); 560extern int iplclose __P((dev_t, int, int, struct proc *)); 561# else 562# ifndef linux 563extern int iplopen __P((dev_t, int)); 564extern int iplclose __P((dev_t, int)); 565extern int iplioctl __P((dev_t, int, caddr_t, int)); 566# else 567extern int iplioctl(struct inode *, struct file *, u_int, u_long); 568extern int iplopen __P((struct inode *, struct file *)); 569extern void iplclose __P((struct inode *, struct file *)); 570# endif /* !linux */ 571# endif /* (_BSDI_VERSION >= 199510) */ 572# if BSD >= 199306 573extern int iplread __P((dev_t, struct uio *, int)); 574# else 575# ifndef linux 576extern int iplread __P((dev_t, struct uio *)); 577# else 578extern int iplread(struct inode *, struct file *, char *, int); 579# endif /* !linux */ 580# endif /* BSD >= 199306 */ 581# endif /* __ sgi */ 582# endif /* SOLARIS */ 583#endif /* #ifndef _KERNEL */ 584 585extern char *memstr __P((char *, char *, int, int)); 586extern void fixskip __P((frentry_t **, frentry_t *, int)); 587extern int countbits __P((u_32_t)); 588extern int ipldetach __P((void)); 589extern u_short ipf_cksum __P((u_short *, int)); 590extern int ircopyptr __P((void *, void *, size_t)); 591extern int iwcopyptr __P((void *, void *, size_t)); 592 593extern int frflush __P((minor_t, int)); 594extern void frsync __P((void)); 595extern frgroup_t *fr_addgroup __P((u_32_t, frentry_t *, minor_t, int)); 596extern void fr_delgroup __P((u_32_t, u_32_t, minor_t, int)); 597extern frgroup_t *fr_findgroup __P((u_32_t, u_32_t, minor_t, int, 598 frgroup_t ***)); 599 600extern int fr_copytolog __P((int, char *, int)); 601extern void fr_forgetifp __P((void *)); 602extern void fr_getstat __P((struct friostat *)); 603extern int fr_ifpaddr __P((int, void *, struct in_addr *)); 604extern int fr_lock __P((caddr_t, int *)); 605extern void fr_makefrip __P((int, ip_t *, fr_info_t *)); 606extern u_short fr_tcpsum __P((mb_t *, ip_t *, tcphdr_t *)); 607extern int fr_scanlist __P((u_32_t, ip_t *, fr_info_t *, void *)); 608extern int fr_tcpudpchk __P((frtuc_t *, fr_info_t *)); 609extern int fr_verifysrc __P((struct in_addr, void *)); 610 611extern int ipl_unreach; 612extern int fr_running; 613extern u_long ipl_frouteok[2]; 614extern int fr_pass; 615extern int fr_flags; 616extern int fr_active; 617extern int fr_chksrc; 618extern fr_info_t frcache[2]; 619extern char ipfilter_version[]; 620extern iplog_t **iplh[IPL_LOGMAX+1], *iplt[IPL_LOGMAX+1]; 621extern size_t iplused[IPL_LOGMAX + 1]; 622extern struct frentry *ipfilter[2][2], *ipacct[2][2]; 623#ifdef USE_INET6 624extern struct frentry *ipfilter6[2][2], *ipacct6[2][2]; 625extern int icmptoicmp6types[ICMP_MAXTYPE+1]; 626extern int icmptoicmp6unreach[ICMP_MAX_UNREACH]; 627#endif 628extern struct frgroup *ipfgroups[3][2]; 629extern struct filterstats frstats[]; 630 631#endif /* __IP_FIL_H__ */ 632