ip_fil.h revision 369246
1110476Strhodes/*
266830Sobrien * Copyright (C) 2012 by Darren Reed.
366830Sobrien *
466830Sobrien * See the IPFILTER.LICENCE file for details on licencing.
566830Sobrien *
666830Sobrien * @(#)ip_fil.h	1.35 6/5/96
766830Sobrien * $FreeBSD: stable/11/sys/contrib/ipfilter/netinet/ip_fil.h 369246 2021-02-09 13:47:51Z cy $
866830Sobrien * Id: ip_fil.h,v 2.170.2.51 2007/10/10 09:48:03 darrenr Exp $
966830Sobrien */
1066830Sobrien
1166830Sobrien#ifndef	__IP_FIL_H__
1266830Sobrien#define	__IP_FIL_H__
1366830Sobrien
1466830Sobrien#include <netinet/in.h>
1566830Sobrien
1666830Sobrien#include "netinet/ip_compat.h"
1766830Sobrien#include "netinet/ipf_rb.h"
1866830Sobrien#if NETBSD_GE_REV(104040000)
1966830Sobrien# include <sys/callout.h>
2066830Sobrien#endif
2166830Sobrien#if defined(BSD) && defined(_KERNEL)
2266830Sobrien# include <sys/selinfo.h>
2366830Sobrien#endif
2466830Sobrien
2566830Sobrien#ifndef	SOLARIS
2650472Speter# if defined(sun) && defined(__SVR4)
2766830Sobrien#  define	SOLARIS		1
2815027Sphk# else
2966830Sobrien#  define	SOLARIS		0
3066830Sobrien# endif
3166830Sobrien#endif
3266830Sobrien
3343849Sjkh#ifndef	__P
3481618Sdd# define	__P(x)	x
3581618Sdd#endif
3681618Sdd
3781618Sdd#define	SIOCADAFR	_IOW('r', 60, struct ipfobj)
3881618Sdd#define	SIOCRMAFR	_IOW('r', 61, struct ipfobj)
3981618Sdd#define	SIOCSETFF	_IOW('r', 62, u_int)
4081618Sdd#define	SIOCGETFF	_IOR('r', 63, u_int)
4133203Sadam#define	SIOCGETFS	_IOWR('r', 64, struct ipfobj)
4233203Sadam#define	SIOCIPFFL	_IOWR('r', 65, int)
4315027Sphk#define	SIOCIPFFB	_IOR('r', 66, int)
4429300Sdanny#define	SIOCADIFR	_IOW('r', 67, struct ipfobj)
4529300Sdanny#define	SIOCRMIFR	_IOW('r', 68, struct ipfobj)
4629300Sdanny#define	SIOCSWAPA	_IOR('r', 69, u_int)
4729300Sdanny#define	SIOCINAFR	_IOW('r', 70, struct ipfobj)
4829300Sdanny#define	SIOCINIFR	_IOW('r', 71, struct ipfobj)
4929300Sdanny#define	SIOCFRENB	_IOW('r', 72, u_int)
5029300Sdanny#define	SIOCFRSYN	_IOW('r', 73, u_int)
5115027Sphk#define	SIOCFRZST	_IOWR('r', 74, struct ipfobj)
5251231Ssheldonh#define	SIOCZRLST	_IOWR('r', 75, struct ipfobj)
5329300Sdanny#define	SIOCAUTHW	_IOWR('r', 76, struct ipfobj)
5415027Sphk#define	SIOCAUTHR	_IOWR('r', 77, struct ipfobj)
5515027Sphk#define	SIOCSTAT1	_IOWR('r', 78, struct ipfobj)
5615027Sphk#define	SIOCSTLCK	_IOWR('r', 79, u_int)
5715027Sphk#define	SIOCSTPUT	_IOWR('r', 80, struct ipfobj)
5815027Sphk#define	SIOCSTGET	_IOWR('r', 81, struct ipfobj)
5915027Sphk#define	SIOCSTGSZ	_IOWR('r', 82, struct ipfobj)
6073023Sdes#define	SIOCSTAT2	_IOWR('r', 83, struct ipfobj)
6115210Sphk#define	SIOCSETLG	_IOWR('r', 84, int)
6215210Sphk#define	SIOCGETLG	_IOWR('r', 85, int)
6315210Sphk#define	SIOCFUNCL	_IOWR('r', 86, struct ipfunc_resolve)
6473023Sdes#define	SIOCIPFGETNEXT	_IOWR('r', 87, struct ipfobj)
6525478Sjkh#define	SIOCIPFGET	_IOWR('r', 88, struct ipfobj)
6673023Sdes#define	SIOCIPFSET	_IOWR('r', 89, struct ipfobj)
6715210Sphk#define	SIOCIPFL6	_IOWR('r', 90, int)
6815210Sphk#define	SIOCIPFITER	_IOWR('r', 91, struct ipfobj)
6915210Sphk#define	SIOCGENITER	_IOWR('r', 92, struct ipfobj)
7015027Sphk#define	SIOCGTABL	_IOWR('r', 93, struct ipfobj)
7115027Sphk#define	SIOCIPFDELTOK	_IOWR('r', 94, int)
7215027Sphk#define	SIOCLOOKUPITER	_IOWR('r', 95, struct ipfobj)
7315027Sphk#define	SIOCGTQTAB	_IOWR('r', 96, struct ipfobj)
7415027Sphk#define	SIOCMATCHFLUSH	_IOWR('r', 97, struct ipfobj)
7573023Sdes#define	SIOCIPFINTERROR	_IOR('r', 98, int)
7625478Sjkh#define	SIOCADDFR	SIOCADAFR
7773023Sdes#define	SIOCDELFR	SIOCRMAFR
7815027Sphk#define	SIOCINSFR	SIOCINAFR
7915027Sphk#define	SIOCATHST	SIOCSTAT1
8091019Scjc#define	SIOCGFRST	SIOCSTAT2
8191019Scjc
8291019Scjc
8391019Scjcstruct ipscan;
8491019Scjcstruct ifnet;
8591019Scjcstruct ipf_main_softc_s;
8691019Scjc
8791019Scjctypedef	int	(* lookupfunc_t)(struct ipf_main_softc_s *, void *,
8891019Scjc				      int, void *, u_int);
8951231Ssheldonh
9051231Ssheldonh/*
9129300Sdanny * i6addr is used as a container for both IPv4 and IPv6 addresses, as well
9229300Sdanny * as other types of objects, depending on its qualifier.
9315027Sphk */
9429300Sdannytypedef	union	i6addr	{
9551231Ssheldonh	u_32_t	i6[4];
9651231Ssheldonh	struct	in_addr	in4;
9751231Ssheldonh#ifdef	USE_INET6
9829300Sdanny	struct	in6_addr in6;
9951231Ssheldonh#endif
10051231Ssheldonh	void	*vptr[2];
10129300Sdanny	lookupfunc_t	lptr[2];
10251231Ssheldonh	struct {
10351231Ssheldonh		u_short	type;
10429300Sdanny		u_short	subtype;
10529300Sdanny		int	name;
10616578Salex	} i6un;
10751231Ssheldonh} i6addr_t;
10850357Ssheldonh
10916578Salex#define in4_addr	in4.s_addr
11016578Salex#define	iplookupnum	i6[1]
11164244Sru#define	iplookupname	i6un.name
11264244Sru#define	iplookuptype	i6un.type
11364244Sru#define	iplookupsubtype	i6un.subtype
11464244Sru/*
11551231Ssheldonh * NOTE: These DO overlap the above on 64bit systems and this IS recognised.
11664244Sru */
11764244Sru#define	iplookupptr	vptr[0]
11873842Sobrien#define	iplookupfunc	lptr[1]
11964244Sru
12065257Sru#define	I60(x)	(((u_32_t *)(x))[0])
12164244Sru#define	I61(x)	(((u_32_t *)(x))[1])
12264244Sru#define	I62(x)	(((u_32_t *)(x))[2])
12364244Sru#define	I63(x)	(((u_32_t *)(x))[3])
12464244Sru#define	HI60(x)	ntohl(((u_32_t *)(x))[0])
12564244Sru#define	HI61(x)	ntohl(((u_32_t *)(x))[1])
12664244Sru#define	HI62(x)	ntohl(((u_32_t *)(x))[2])
12764244Sru#define	HI63(x)	ntohl(((u_32_t *)(x))[3])
12851231Ssheldonh
12935267Sbrian#define	IP6_EQ(a,b)	((I63(a) == I63(b)) && (I62(a) == I62(b)) && \
13035267Sbrian			 (I61(a) == I61(b)) && (I60(a) == I60(b)))
13115027Sphk#define	IP6_NEQ(a,b)	((I63(a) != I63(b)) || (I62(a) != I62(b)) || \
13215027Sphk			 (I61(a) != I61(b)) || (I60(a) != I60(b)))
13351805Smpp#define IP6_ISZERO(a)   ((I60(a) | I61(a) | I62(a) | I63(a)) == 0)
13417594Sjkh#define IP6_NOTZERO(a)  ((I60(a) | I61(a) | I62(a) | I63(a)) != 0)
13551231Ssheldonh#define	IP6_ISONES(a)	((I63(a) == 0xffffffff) && (I62(a) == 0xffffffff) && \
13650357Ssheldonh			 (I61(a) == 0xffffffff) && (I60(a) == 0xffffffff))
13715027Sphk#define	IP6_GT(a,b)	(ntohl(HI60(a)) > ntohl(HI60(b)) || \
13815027Sphk			 (HI60(a) == HI60(b) && \
13917594Sjkh			  (ntohl(HI61(a)) > ntohl(HI61(b)) || \
14051231Ssheldonh			   (HI61(a) == HI61(b) && \
14151231Ssheldonh			    (ntohl(HI62(a)) > ntohl(HI62(b)) || \
14251231Ssheldonh			     (HI62(a) == HI62(b) && \
14391019Scjc			      ntohl(HI63(a)) > ntohl(HI63(b))))))))
14450357Ssheldonh#define	IP6_LT(a,b)	(ntohl(HI60(a)) < ntohl(HI60(b)) || \
14551231Ssheldonh			 (HI60(a) == HI60(b) && \
14654108Sobrien			  (ntohl(HI61(a)) < ntohl(HI61(b)) || \
14751231Ssheldonh			   (HI61(a) == HI61(b) && \
14851231Ssheldonh			    (ntohl(HI62(a)) < ntohl(HI62(b)) || \
14951231Ssheldonh			     (HI62(a) == HI62(b) && \
15051231Ssheldonh			      ntohl(HI63(a)) < ntohl(HI63(b))))))))
15151231Ssheldonh#define	NLADD(n,x)	htonl(ntohl(n) + (x))
15229300Sdanny#define	IP6_INC(a)	\
15351231Ssheldonh		do { u_32_t *_i6 = (u_32_t *)(a); \
15456736Srgrimes		  _i6[3] = NLADD(_i6[3], 1); \
15551231Ssheldonh		  if (_i6[3] == 0) { \
15656736Srgrimes			_i6[2] = NLADD(_i6[2], 1); \
15717594Sjkh			if (_i6[2] == 0) { \
15891019Scjc				_i6[1] = NLADD(_i6[1], 1); \
15991019Scjc				if (_i6[1] == 0) { \
16051231Ssheldonh					_i6[0] = NLADD(_i6[0], 1); \
16151231Ssheldonh				} \
16251231Ssheldonh			} \
16315027Sphk		  } \
16451231Ssheldonh		} while (0)
16551231Ssheldonh#define	IP6_ADD(a,x,d)	\
16615027Sphk		do { i6addr_t *_s = (i6addr_t *)(a); \
16752873Sru		  i6addr_t *_d = (i6addr_t *)(d); \
16852873Sru		  _d->i6[0] = NLADD(_s->i6[0], x); \
16952873Sru		  if (ntohl(_d->i6[0]) < ntohl(_s->i6[0])) { \
17051231Ssheldonh			_d->i6[1] = NLADD(_d->i6[1], 1); \
17151231Ssheldonh			if (ntohl(_d->i6[1]) < ntohl(_s->i6[1])) { \
17215027Sphk				_d->i6[2] = NLADD(_d->i6[2], 1); \
17351231Ssheldonh				if (ntohl(_d->i6[2]) < ntohl(_s->i6[2])) { \
17451231Ssheldonh					_d->i6[3] = NLADD(_d->i6[3], 1); \
17515027Sphk				} \
17651231Ssheldonh			} \
17751231Ssheldonh		  } \
17815027Sphk		} while (0)
17951231Ssheldonh#define	IP6_AND(a,b,d)	do { i6addr_t *_s1 = (i6addr_t *)(a); \
18072772Snsayer			  i6addr_t *_s2 = (i6addr_t *)(b); \
18115027Sphk			  i6addr_t *_d = (i6addr_t *)(d); \
18251231Ssheldonh			  _d->i6[0] = _s1->i6[0] & _s2->i6[0]; \
18372772Snsayer			  _d->i6[1] = _s1->i6[1] & _s2->i6[1]; \
18415027Sphk			  _d->i6[2] = _s1->i6[2] & _s2->i6[2]; \
18551231Ssheldonh			  _d->i6[3] = _s1->i6[3] & _s2->i6[3]; \
18651231Ssheldonh			} while (0)
18751231Ssheldonh#define	IP6_ANDASSIGN(a,m) \
18851231Ssheldonh			do { i6addr_t *_d = (i6addr_t *)(a); \
18915027Sphk			  i6addr_t *_m = (i6addr_t *)(m); \
19051231Ssheldonh			  _d->i6[0] &= _m->i6[0]; \
19151231Ssheldonh			  _d->i6[1] &= _m->i6[1]; \
19251231Ssheldonh			  _d->i6[2] &= _m->i6[2]; \
193121881Sru			  _d->i6[3] &= _m->i6[3]; \
19451231Ssheldonh			} while (0)
19551231Ssheldonh#define	IP6_MASKEQ(a,m,b) \
19615027Sphk			(((I60(a) & I60(m)) == I60(b)) && \
19751231Ssheldonh			 ((I61(a) & I61(m)) == I61(b)) && \
19851231Ssheldonh			 ((I62(a) & I62(m)) == I62(b)) && \
19956736Srgrimes			 ((I63(a) & I63(m)) == I63(b)))
20056736Srgrimes#define	IP6_MASKNEQ(a,m,b) \
20156736Srgrimes			(((I60(a) & I60(m)) != I60(b)) || \
20217594Sjkh			 ((I61(a) & I61(m)) != I61(b)) || \
20351231Ssheldonh			 ((I62(a) & I62(m)) != I62(b)) || \
20451231Ssheldonh			 ((I63(a) & I63(m)) != I63(b)))
20556736Srgrimes#define	IP6_MERGE(a,b,c) \
20656736Srgrimes			do { i6addr_t *_d, *_s1, *_s2; \
20756736Srgrimes			  _d = (i6addr_t *)(a); \
20815027Sphk			  _s1 = (i6addr_t *)(b); \
20991019Scjc			  _s2 = (i6addr_t *)(c); \
21091019Scjc			  _d->i6[0] |= _s1->i6[0] & ~_s2->i6[0]; \
21151231Ssheldonh			  _d->i6[1] |= _s1->i6[1] & ~_s2->i6[1]; \
21251231Ssheldonh			  _d->i6[2] |= _s1->i6[2] & ~_s2->i6[2]; \
21351231Ssheldonh			  _d->i6[3] |= _s1->i6[3] & ~_s2->i6[3]; \
21415027Sphk			} while (0)
21551231Ssheldonh#define	IP6_MASK(a,b,c) \
21656736Srgrimes			do { i6addr_t *_d, *_s1, *_s2; \
21756736Srgrimes			  _d = (i6addr_t *)(a); \
21856736Srgrimes			  _s1 = (i6addr_t *)(b); \
21915027Sphk			  _s2 = (i6addr_t *)(c); \
22064028Sobrien			  _d->i6[0] = _s1->i6[0] & ~_s2->i6[0]; \
22164028Sobrien			  _d->i6[1] = _s1->i6[1] & ~_s2->i6[1]; \
22264028Sobrien			  _d->i6[2] = _s1->i6[2] & ~_s2->i6[2]; \
22356736Srgrimes			  _d->i6[3] = _s1->i6[3] & ~_s2->i6[3]; \
22456736Srgrimes			} while (0)
22556736Srgrimes#define	IP6_SETONES(a)	\
22656736Srgrimes			do { i6addr_t *_d = (i6addr_t *)(a); \
22756736Srgrimes			  _d->i6[0] = 0xffffffff; \
22856736Srgrimes			  _d->i6[1] = 0xffffffff; \
22964244Sru			  _d->i6[2] = 0xffffffff; \
23064244Sru			  _d->i6[3] = 0xffffffff; \
23164244Sru			} while (0)
23264244Sru
23364244Srutypedef	union ipso_u	{
23464244Sru	u_short	ipso_ripso[2];
23564244Sru	u_32_t	ipso_doi;
23664244Sru} ipso_t;
23764244Sru
23864244Srutypedef	struct	fr_ip	{
23964244Sru	u_32_t	fi_v:4;		/* IP version */
24064244Sru	u_32_t	fi_xx:4;	/* spare */
24164244Sru	u_32_t	fi_tos:8;	/* IP packet TOS */
24264244Sru	u_32_t	fi_ttl:8;	/* IP packet TTL */
24364244Sru	u_32_t	fi_p:8;		/* IP packet protocol */
24464244Sru	u_32_t	fi_optmsk;	/* bitmask composed from IP options */
24564244Sru	i6addr_t fi_src;	/* source address from packet */
24664244Sru	i6addr_t fi_dst;	/* destination address from packet */
24764244Sru	ipso_t	fi_ipso;	/* IP security options */
24864244Sru	u_32_t	fi_flx;		/* packet flags */
24964244Sru	u_32_t	fi_tcpmsk;	/* TCP options set/reset */
25064244Sru	u_32_t	fi_ports[2];	/* TCP ports */
25164244Sru	u_char	fi_tcpf;	/* TCP flags */
25264244Sru	u_char	fi_sensitivity;
25364244Sru	u_char	fi_xxx[2];	/* pad */
25464244Sru} fr_ip_t;
25564244Sru
25664244Sru/*
25764244Sru * For use in fi_flx
25851231Ssheldonh */
25951231Ssheldonh#define	FI_TCPUDP	0x0001	/* TCP/UCP implied comparison*/
26015027Sphk#define	FI_OPTIONS	0x0002
26152873Sru#define	FI_FRAG		0x0004
26252873Sru#define	FI_SHORT	0x0008
26352873Sru#define	FI_NATED	0x0010
26451231Ssheldonh#define	FI_MULTICAST	0x0020
26551231Ssheldonh#define	FI_BROADCAST	0x0040
26615027Sphk#define	FI_MBCAST	0x0080
26751231Ssheldonh#define	FI_STATE	0x0100
26851231Ssheldonh#define	FI_BADNAT	0x0200
26952404Sru#define	FI_BAD		0x0400
27052404Sru#define	FI_OOW		0x0800	/* Out of state window, else match */
27115027Sphk#define	FI_ICMPERR	0x1000
27251231Ssheldonh#define	FI_FRAGBODY	0x2000
27351231Ssheldonh#define	FI_BADSRC	0x4000
27415027Sphk#define	FI_LOWTTL	0x8000
27551231Ssheldonh#define	FI_CMP		0x5cfe3	/* Not FI_FRAG,FI_NATED,FI_FRAGTAIL */
27651231Ssheldonh#define	FI_ICMPCMP	0x0003	/* Flags we can check for ICMP error packets */
27715027Sphk#define	FI_WITH		0x5effe	/* Not FI_TCPUDP */
27851231Ssheldonh#define	FI_V6EXTHDR	0x10000
27951231Ssheldonh#define	FI_COALESCE	0x20000
28015027Sphk#define	FI_NEWNAT	0x40000
28151231Ssheldonh#define	FI_ICMPQUERY	0x80000
28272772Snsayer#define	FI_ENCAP	0x100000	/* encap/decap with NAT */
28315027Sphk#define	FI_AH		0x200000	/* AH header present */
28451231Ssheldonh#define	FI_DOCKSUM	0x10000000	/* Proxy wants L4 recalculation */
28572772Snsayer#define	FI_NOCKSUM	0x20000000	/* don't do a L4 checksum validation */
28615027Sphk#define	FI_NOWILD	0x40000000	/* Do not do wildcard searches */
28751231Ssheldonh#define	FI_IGNORE	0x80000000
28851231Ssheldonh
28951231Ssheldonh#define	fi_secmsk	fi_ipso.ipso_ripso[0]
29051231Ssheldonh#define	fi_auth		fi_ipso.ipso_ripso[1]
29115027Sphk#define	fi_doi		fi_ipso.ipso_doi
29291019Scjc#define	fi_saddr	fi_src.in4.s_addr
29391019Scjc#define	fi_daddr	fi_dst.in4.s_addr
29491019Scjc#define	fi_srcnum	fi_src.iplookupnum
29551231Ssheldonh#define	fi_dstnum	fi_dst.iplookupnum
29651231Ssheldonh#define	fi_srcname	fi_src.iplookupname
29751231Ssheldonh#define	fi_dstname	fi_dst.iplookupname
29859669Sbsd#define	fi_srctype	fi_src.iplookuptype
29957014Spaul#define	fi_dsttype	fi_dst.iplookuptype
30051231Ssheldonh#define	fi_srcsubtype	fi_src.iplookupsubtype
30151231Ssheldonh#define	fi_dstsubtype	fi_dst.iplookupsubtype
30251231Ssheldonh#define	fi_srcptr	fi_src.iplookupptr
303#define	fi_dstptr	fi_dst.iplookupptr
304#define	fi_srcfunc	fi_src.iplookupfunc
305#define	fi_dstfunc	fi_dst.iplookupfunc
306
307
308/*
309 * These are both used by the state and NAT code to indicate that one port or
310 * the other should be treated as a wildcard.
311 * NOTE: When updating, check bit masks in ip_state.h and update there too.
312 */
313#define	SI_W_SPORT	0x00000100
314#define	SI_W_DPORT	0x00000200
315#define	SI_WILDP	(SI_W_SPORT|SI_W_DPORT)
316#define	SI_W_SADDR	0x00000400
317#define	SI_W_DADDR	0x00000800
318#define	SI_WILDA	(SI_W_SADDR|SI_W_DADDR)
319#define	SI_NEWFR	0x00001000
320#define	SI_CLONE	0x00002000
321#define	SI_CLONED	0x00004000
322#define	SI_NEWCLONE	0x00008000
323
324typedef	struct {
325	u_short	fda_ports[2];
326	u_char	fda_tcpf;		/* TCP header flags (SYN, ACK, etc) */
327} frdat_t;
328
329typedef enum fr_breasons_e {
330	FRB_BLOCKED = 0,
331	FRB_LOGFAIL = 1,
332	FRB_PPSRATE = 2,
333	FRB_JUMBO = 3,
334	FRB_MAKEFRIP = 4,
335	FRB_STATEADD = 5,
336	FRB_UPDATEIPID = 6,
337	FRB_LOGFAIL2 = 7,
338	FRB_DECAPFRIP = 8,
339	FRB_AUTHNEW = 9,
340	FRB_AUTHCAPTURE = 10,
341	FRB_COALESCE = 11,
342	FRB_PULLUP = 12,
343	FRB_AUTHFEEDBACK = 13,
344	FRB_BADFRAG = 14,
345	FRB_NATV4 = 15,
346	FRB_NATV6 = 16,
347} fr_breason_t;
348
349#define	FRB_MAX_VALUE	16
350
351typedef enum ipf_cksum_e {
352	FI_CK_BAD = -1,
353	FI_CK_NEEDED = 0,
354	FI_CK_SUMOK = 1,
355	FI_CK_L4PART = 2,
356	FI_CK_L4FULL = 4
357} ipf_cksum_t;
358
359typedef	struct	fr_info	{
360	void	*fin_main_soft;
361	void	*fin_ifp;		/* interface packet is `on' */
362	struct	frentry *fin_fr;	/* last matching rule */
363	int	fin_out;		/* in or out ? 1 == out, 0 == in */
364	fr_ip_t	fin_fi;			/* IP Packet summary */
365	frdat_t	fin_dat;		/* TCP/UDP ports, ICMP code/type */
366	int	fin_dlen;		/* length of data portion of packet */
367	int	fin_plen;
368	u_32_t	fin_rule;		/* rule # last matched */
369	u_short	fin_hlen;		/* length of IP header in bytes */
370	char	fin_group[FR_GROUPLEN];	/* group number, -1 for none */
371	void	*fin_dp;		/* start of data past IP header */
372	/*
373	 * Fields after fin_dp aren't used for compression of log records.
374	 * fin_fi contains the IP version (fin_family)
375	 * fin_rule isn't included because adding a new rule can change it but
376	 * not change fin_fr. fin_rule is the rule number reported.
377	 * It isn't necessary to include fin_crc because that is checked
378	 * for explicitly, before calling bcmp.
379	 */
380	u_32_t	fin_crc;		/* Simple calculation for logging */
381	int	fin_family;		/* AF_INET, etc. */
382	int	fin_icode;		/* ICMP error to return */
383	int	fin_mtu;		/* MTU input for ICMP need-frag */
384	int	fin_rev;		/* state only: 1 = reverse */
385	int	fin_ipoff;		/* # bytes from buffer start to hdr */
386	u_32_t	fin_id;			/* IP packet id field */
387	u_short	fin_l4hlen;		/* length of L4 header, if known */
388	u_short	fin_off;
389	int	fin_depth;		/* Group nesting depth */
390	int	fin_error;		/* Error code to return */
391	ipf_cksum_t	fin_cksum;	/* -1 = bad, 1 = good, 0 = not done */
392	fr_breason_t	fin_reason;	/* why auto blocked */
393	u_int	fin_pktnum;
394	void	*fin_nattag;
395	struct frdest	*fin_dif;
396	struct frdest	*fin_tif;
397	union {
398		ip_t	*fip_ip;
399#ifdef USE_INET6
400		ip6_t	*fip_ip6;
401#endif
402	} fin_ipu;
403	mb_t	**fin_mp;		/* pointer to pointer to mbuf */
404	mb_t	*fin_m;			/* pointer to mbuf */
405#ifdef	MENTAT
406	mb_t	*fin_qfm;		/* pointer to mblk where pkt starts */
407	void	*fin_qpi;
408	char	fin_ifname[LIFNAMSIZ];
409#endif
410	void	*fin_fraghdr;		/* pointer to start of ipv6 frag hdr */
411} fr_info_t;
412
413#define	fin_ip		fin_ipu.fip_ip
414#define	fin_ip6		fin_ipu.fip_ip6
415#define	fin_v		fin_fi.fi_v
416#define	fin_p		fin_fi.fi_p
417#define	fin_flx		fin_fi.fi_flx
418#define	fin_optmsk	fin_fi.fi_optmsk
419#define	fin_secmsk	fin_fi.fi_secmsk
420#define	fin_doi		fin_fi.fi_doi
421#define	fin_auth	fin_fi.fi_auth
422#define	fin_src		fin_fi.fi_src.in4
423#define	fin_saddr	fin_fi.fi_saddr
424#define	fin_dst		fin_fi.fi_dst.in4
425#define	fin_daddr	fin_fi.fi_daddr
426#define	fin_data	fin_fi.fi_ports
427#define	fin_sport	fin_fi.fi_ports[0]
428#define	fin_dport	fin_fi.fi_ports[1]
429#define	fin_tcpf	fin_fi.fi_tcpf
430#define	fin_src6	fin_fi.fi_src
431#define	fin_dst6	fin_fi.fi_dst
432#define	fin_srcip6	fin_fi.fi_src.in6
433#define	fin_dstip6	fin_fi.fi_dst.in6
434
435#define	IPF_IN		0
436#define	IPF_OUT		1
437
438typedef	struct frentry	*(*ipfunc_t)(fr_info_t *, u_32_t *);
439typedef	int		(*ipfuncinit_t)(struct ipf_main_softc_s *, struct frentry *);
440
441typedef	struct	ipfunc_resolve	{
442	char		ipfu_name[32];
443	ipfunc_t	ipfu_addr;
444	ipfuncinit_t	ipfu_init;
445	ipfuncinit_t	ipfu_fini;
446} ipfunc_resolve_t;
447
448/*
449 * Size for compares on fr_info structures
450 */
451#define	FI_CSIZE	offsetof(fr_info_t, fin_icode)
452#define	FI_LCSIZE	offsetof(fr_info_t, fin_dp)
453
454/*
455 * Size for copying cache fr_info structure
456 */
457#define	FI_COPYSIZE	offsetof(fr_info_t, fin_dp)
458
459/*
460 * Structure for holding IPFilter's tag information
461 */
462#define	IPFTAG_LEN	16
463typedef	struct	{
464	union	{
465		u_32_t	iptu_num[4];
466		char	iptu_tag[IPFTAG_LEN];
467	} ipt_un;
468	int	ipt_not;
469} ipftag_t;
470
471#define	ipt_tag	ipt_un.iptu_tag
472#define	ipt_num	ipt_un.iptu_num
473
474/*
475 * Structure to define address for pool lookups.
476 */
477typedef	struct	{
478	u_char		adf_len;
479	sa_family_t	adf_family;
480	u_char		adf_xxx[2];
481	i6addr_t	adf_addr;
482} addrfamily_t;
483
484
485RBI_LINK(ipf_rb, host_node_s);
486
487typedef	struct	host_node_s {
488	RBI_FIELD(ipf_rb)	hn_entry;
489	addrfamily_t		hn_addr;
490	int			hn_active;
491} host_node_t;
492
493typedef RBI_HEAD(ipf_rb, host_node_s) ipf_rb_head_t;
494
495typedef	struct	host_track_s {
496	ipf_rb_head_t	ht_root;
497	int		ht_max_nodes;
498	int		ht_max_per_node;
499	int		ht_netmask;
500	int		ht_cur_nodes;
501} host_track_t;
502
503
504typedef enum fr_dtypes_e {
505	FRD_NORMAL = 0,
506	FRD_DSTLIST
507} fr_dtypes_t;
508/*
509 * This structure is used to hold information about the next hop for where
510 * to forward a packet.
511 */
512typedef	struct	frdest	{
513	void		*fd_ptr;
514	addrfamily_t	fd_addr;
515	fr_dtypes_t	fd_type;
516	int		fd_name;
517} frdest_t;
518
519#define	fd_ip6	fd_addr.adf_addr
520#define	fd_ip	fd_ip6.in4
521
522
523typedef enum fr_ctypes_e {
524	FR_NONE = 0,
525	FR_EQUAL,
526	FR_NEQUAL,
527	FR_LESST,
528	FR_GREATERT,
529	FR_LESSTE,
530	FR_GREATERTE,
531	FR_OUTRANGE,
532	FR_INRANGE,
533	FR_INCRANGE
534} fr_ctypes_t;
535
536/*
537 * This structure holds information about a port comparison.
538 */
539typedef	struct	frpcmp	{
540	fr_ctypes_t	frp_cmp;	/* data for port comparisons */
541	u_32_t		frp_port;	/* low port for <> and >< */
542	u_32_t		frp_top;	/* high port for <> and >< */
543} frpcmp_t;
544
545
546/*
547 * Structure containing all the relevant TCP/UDP things that can be checked in
548 * a filter rule.
549 */
550typedef	struct	frtuc	{
551	u_char		ftu_tcpfm;	/* tcp flags mask */
552	u_char		ftu_tcpf;	/* tcp flags */
553	frpcmp_t	ftu_src;	/* source port */
554	frpcmp_t	ftu_dst;	/* destination port */
555} frtuc_t;
556
557#define	ftu_scmp	ftu_src.frp_cmp
558#define	ftu_dcmp	ftu_dst.frp_cmp
559#define	ftu_sport	ftu_src.frp_port
560#define	ftu_dport	ftu_dst.frp_port
561#define	ftu_stop	ftu_src.frp_top
562#define	ftu_dtop	ftu_dst.frp_top
563
564#define	FR_TCPFMAX	0x3f
565
566typedef enum fr_atypes_e {
567	FRI_NONE = -1,	/* For LHS of NAT */
568	FRI_NORMAL = 0,	/* Normal address */
569	FRI_DYNAMIC,	/* dynamic address */
570	FRI_LOOKUP,	/* address is a pool # */
571	FRI_RANGE,	/* address/mask is a range */
572	FRI_NETWORK,	/* network address from if */
573	FRI_BROADCAST,	/* broadcast address from if */
574	FRI_PEERADDR,	/* Peer address for P-to-P */
575	FRI_NETMASKED,	/* network address with netmask from if */
576	FRI_SPLIT,	/* For NAT compatibility */
577	FRI_INTERFACE	/* address is based on interface name */
578} fr_atypes_t;
579
580/*
581 * This structure makes up what is considered to be the IPFilter specific
582 * matching components of a filter rule, as opposed to the data structures
583 * used to define the result which are in frentry_t and not here.
584 */
585typedef	struct	fripf	{
586	fr_ip_t		fri_ip;
587	fr_ip_t		fri_mip;	/* mask structure */
588
589	u_short		fri_icmpm;	/* data for ICMP packets (mask) */
590	u_short		fri_icmp;
591
592	frtuc_t		fri_tuc;
593	fr_atypes_t	fri_satype;	/* addres type */
594	fr_atypes_t	fri_datype;	/* addres type */
595	int		fri_sifpidx;	/* doing dynamic addressing */
596	int		fri_difpidx;	/* index into fr_ifps[] to use when */
597} fripf_t;
598
599#define	fri_dlookup	fri_mip.fi_dst
600#define	fri_slookup	fri_mip.fi_src
601#define	fri_dstnum	fri_mip.fi_dstnum
602#define	fri_srcnum	fri_mip.fi_srcnum
603#define	fri_dstname	fri_mip.fi_dstname
604#define	fri_srcname	fri_mip.fi_srcname
605#define	fri_dstptr	fri_mip.fi_dstptr
606#define	fri_srcptr	fri_mip.fi_srcptr
607
608
609typedef enum fr_rtypes_e {
610	FR_T_NONE = 0,
611	FR_T_IPF,		/* IPF structures */
612	FR_T_BPFOPC,		/* BPF opcode */
613	FR_T_CALLFUNC,		/* callout to function in fr_func only */
614	FR_T_COMPIPF,			/* compiled C code */
615	FR_T_IPFEXPR,			/* IPF expression */
616	FR_T_BUILTIN = 0x40000000,	/* rule is in kernel space */
617	FR_T_IPF_BUILTIN,
618	FR_T_BPFOPC_BUILTIN,
619	FR_T_CALLFUNC_BUILTIN,
620	FR_T_COMPIPF_BUILTIN,
621	FR_T_IPFEXPR_BUILTIN
622} fr_rtypes_t;
623
624typedef	struct	frentry	* (* frentfunc_t)(fr_info_t *);
625
626typedef	struct	frentry {
627	ipfmutex_t	fr_lock;
628	struct	frentry	*fr_next;
629	struct	frentry	**fr_pnext;
630	struct	frgroup	*fr_grp;
631	struct	frgroup	*fr_grphead;
632	struct	frgroup	*fr_icmpgrp;
633	struct	ipscan	*fr_isc;
634	struct	frentry	*fr_dnext;	/* 2 fr_die linked list pointers */
635	struct	frentry	**fr_pdnext;
636	void	*fr_ifas[4];
637	void	*fr_ptr;	/* for use with fr_arg */
638	int	fr_comment;	/* text comment for rule */
639	int	fr_size;	/* size of this structure */
640	int	fr_ref;		/* reference count */
641	int	fr_statecnt;	/* state count - for limit rules */
642	u_32_t	fr_die;		/* only used on loading the rule */
643	u_int	fr_cksum;	/* checksum on filter rules for performance */
644	/*
645	 * The line number from a file is here because we need to be able to
646	 * match the rule generated with ``grep rule ipf.conf | ipf -rf -''
647	 * with the rule loaded using ``ipf -f ipf.conf'' - thus it can't be
648	 * on the other side of fr_func.
649	 */
650	int	fr_flineno;	/* line number from conf file */
651	/*
652	 * These are only incremented when a packet  matches this rule and
653	 * it is the last match
654	 */
655	U_QUAD_T	fr_hits;
656	U_QUAD_T	fr_bytes;
657
658	/*
659	 * For PPS rate limiting
660	 * fr_lpu is used to always have the same size for this field,
661	 * allocating 64bits for seconds and 32bits for milliseconds.
662	 */
663	union {
664		struct timeval	frp_lastpkt;
665		char	frp_bytes[12];
666	} fr_lpu;
667	int		fr_curpps;
668
669	union	{
670		void		*fru_data;
671		char		*fru_caddr;
672		fripf_t		*fru_ipf;
673		frentfunc_t	fru_func;
674	} fr_dun;
675
676	/*
677	 * Fields after this may not change whilst in the kernel.
678	 */
679	ipfunc_t fr_func; 	/* call this function */
680	int	fr_dsize;
681	int	fr_pps;
682	fr_rtypes_t	fr_type;
683	u_32_t	fr_flags;	/* per-rule flags && options (see below) */
684	u_32_t	fr_logtag;	/* user defined log tag # */
685	u_32_t	fr_collect;	/* collection number */
686	u_int	fr_arg;		/* misc. numeric arg for rule */
687	u_int	fr_loglevel;	/* syslog log facility + priority */
688	u_char	fr_family;
689	u_char	fr_icode;	/* return ICMP code */
690	int	fr_group;	/* group to which this rule belongs */
691	int	fr_grhead;	/* group # which this rule starts */
692	int	fr_isctag;
693	int	fr_rpc;		/* XID Filtering */
694	ipftag_t fr_nattag;
695	/*
696	 * These are all options related to stateful filtering
697	 */
698	host_track_t	fr_srctrack;
699	int	fr_nostatelog;
700	int	fr_statemax;	/* max reference count */
701	int	fr_icmphead;	/* ICMP group  for state options */
702	u_int	fr_age[2];	/* non-TCP state timeouts */
703	/*
704	 * These are compared separately.
705	 */
706	int	fr_ifnames[4];
707	frdest_t fr_tifs[2];	/* "to"/"reply-to" interface */
708	frdest_t fr_dif;	/* duplicate packet interface */
709	/*
710	 * How big is the name buffer at the end?
711	 */
712	int	fr_namelen;
713	char	fr_names[1];
714} frentry_t;
715
716#define	fr_lastpkt	fr_lpu.frp_lastpkt
717#define	fr_caddr	fr_dun.fru_caddr
718#define	fr_data		fr_dun.fru_data
719#define	fr_dfunc	fr_dun.fru_func
720#define	fr_ipf		fr_dun.fru_ipf
721#define	fr_ip		fr_ipf->fri_ip
722#define	fr_mip		fr_ipf->fri_mip
723#define	fr_icmpm	fr_ipf->fri_icmpm
724#define	fr_icmp		fr_ipf->fri_icmp
725#define	fr_tuc		fr_ipf->fri_tuc
726#define	fr_satype	fr_ipf->fri_satype
727#define	fr_datype	fr_ipf->fri_datype
728#define	fr_sifpidx	fr_ipf->fri_sifpidx
729#define	fr_difpidx	fr_ipf->fri_difpidx
730#define	fr_proto	fr_ip.fi_p
731#define	fr_mproto	fr_mip.fi_p
732#define	fr_ttl		fr_ip.fi_ttl
733#define	fr_mttl		fr_mip.fi_ttl
734#define	fr_tos		fr_ip.fi_tos
735#define	fr_mtos		fr_mip.fi_tos
736#define	fr_tcpfm	fr_tuc.ftu_tcpfm
737#define	fr_tcpf		fr_tuc.ftu_tcpf
738#define	fr_scmp		fr_tuc.ftu_scmp
739#define	fr_dcmp		fr_tuc.ftu_dcmp
740#define	fr_dport	fr_tuc.ftu_dport
741#define	fr_sport	fr_tuc.ftu_sport
742#define	fr_stop		fr_tuc.ftu_stop
743#define	fr_dtop		fr_tuc.ftu_dtop
744#define	fr_dst		fr_ip.fi_dst.in4
745#define	fr_dst6		fr_ip.fi_dst
746#define	fr_daddr	fr_ip.fi_dst.in4.s_addr
747#define	fr_src		fr_ip.fi_src.in4
748#define	fr_src6		fr_ip.fi_src
749#define	fr_saddr	fr_ip.fi_src.in4.s_addr
750#define	fr_dmsk		fr_mip.fi_dst.in4
751#define	fr_dmsk6	fr_mip.fi_dst
752#define	fr_dmask	fr_mip.fi_dst.in4.s_addr
753#define	fr_smsk		fr_mip.fi_src.in4
754#define	fr_smsk6	fr_mip.fi_src
755#define	fr_smask	fr_mip.fi_src.in4.s_addr
756#define	fr_dstnum	fr_ip.fi_dstnum
757#define	fr_srcnum	fr_ip.fi_srcnum
758#define	fr_dlookup	fr_ip.fi_dst
759#define	fr_slookup	fr_ip.fi_src
760#define	fr_dstname	fr_ip.fi_dstname
761#define	fr_srcname	fr_ip.fi_srcname
762#define	fr_dsttype	fr_ip.fi_dsttype
763#define	fr_srctype	fr_ip.fi_srctype
764#define	fr_dstsubtype	fr_ip.fi_dstsubtype
765#define	fr_srcsubtype	fr_ip.fi_srcsubtype
766#define	fr_dstptr	fr_mip.fi_dstptr
767#define	fr_srcptr	fr_mip.fi_srcptr
768#define	fr_dstfunc	fr_mip.fi_dstfunc
769#define	fr_srcfunc	fr_mip.fi_srcfunc
770#define	fr_optbits	fr_ip.fi_optmsk
771#define	fr_optmask	fr_mip.fi_optmsk
772#define	fr_secbits	fr_ip.fi_secmsk
773#define	fr_secmask	fr_mip.fi_secmsk
774#define	fr_authbits	fr_ip.fi_auth
775#define	fr_authmask	fr_mip.fi_auth
776#define	fr_doi		fr_ip.fi_doi
777#define	fr_doimask	fr_mip.fi_doi
778#define	fr_flx		fr_ip.fi_flx
779#define	fr_mflx		fr_mip.fi_flx
780#define	fr_ifa		fr_ifas[0]
781#define	fr_oifa		fr_ifas[2]
782#define	fr_tif		fr_tifs[0]
783#define	fr_rif		fr_tifs[1]
784
785#define	FR_NOLOGTAG	0
786
787#define	FR_CMPSIZ	(offsetof(struct frentry, fr_ifnames) - \
788			offsetof(struct frentry, fr_func))
789#define	FR_NAME(_f, _n)	(_f)->fr_names + (_f)->_n
790#define FR_NUM(_a)	(sizeof(_a) / sizeof(*_a))
791
792
793/*
794 * fr_flags
795 */
796#define	FR_BLOCK	0x00001	/* do not allow packet to pass */
797#define	FR_PASS		0x00002	/* allow packet to pass */
798#define	FR_AUTH		0x00003	/* use authentication */
799#define	FR_PREAUTH	0x00004	/* require preauthentication */
800#define	FR_ACCOUNT	0x00005	/* Accounting rule */
801#define	FR_SKIP		0x00006	/* skip rule */
802#define	FR_DECAPSULATE	0x00008	/* decapsulate rule */
803#define	FR_CALL		0x00009	/* call rule */
804#define	FR_CMDMASK	0x0000f
805#define	FR_LOG		0x00010	/* Log */
806#define	FR_LOGB		0x00011	/* Log-fail */
807#define	FR_LOGP		0x00012	/* Log-pass */
808#define	FR_LOGMASK	(FR_LOG|FR_CMDMASK)
809#define	FR_CALLNOW	0x00020	/* call another function (fr_func) if matches */
810#define	FR_NOTSRCIP	0x00040
811#define	FR_NOTDSTIP	0x00080
812#define	FR_QUICK	0x00100	/* match & stop processing list */
813#define	FR_KEEPFRAG	0x00200	/* keep fragment information */
814#define	FR_KEEPSTATE	0x00400	/* keep `connection' state information */
815#define	FR_FASTROUTE	0x00800	/* bypass normal routing */
816#define	FR_RETRST	0x01000	/* Return TCP RST packet - reset connection */
817#define	FR_RETICMP	0x02000	/* Return ICMP unreachable packet */
818#define	FR_FAKEICMP	0x03000	/* Return ICMP unreachable with fake source */
819#define	FR_OUTQUE	0x04000	/* outgoing packets */
820#define	FR_INQUE	0x08000	/* ingoing packets */
821#define	FR_LOGBODY	0x10000	/* Log the body */
822#define	FR_LOGFIRST	0x20000	/* Log the first byte if state held */
823#define	FR_LOGORBLOCK	0x40000	/* block the packet if it can't be logged */
824#define	FR_STLOOSE	0x80000	/* loose state checking */
825#define	FR_FRSTRICT	0x100000	/* strict frag. cache */
826#define	FR_STSTRICT	0x200000	/* strict keep state */
827#define	FR_NEWISN	0x400000	/* new ISN for outgoing TCP */
828#define	FR_NOICMPERR	0x800000	/* do not match ICMP errors in state */
829#define	FR_STATESYNC	0x1000000	/* synchronize state to slave */
830#define	FR_COPIED	0x2000000	/* copied from user space */
831#define	FR_INACTIVE	0x4000000	/* only used when flush'ing rules */
832#define	FR_NOMATCH	0x8000000	/* no match occured */
833		/*	0x10000000 	FF_LOGPASS */
834		/*	0x20000000 	FF_LOGBLOCK */
835		/*	0x40000000 	FF_LOGNOMATCH */
836		/*	0x80000000 	FF_BLOCKNONIP */
837
838#define	FR_RETMASK	(FR_RETICMP|FR_RETRST|FR_FAKEICMP)
839#define	FR_ISBLOCK(x)	(((x) & FR_CMDMASK) == FR_BLOCK)
840#define	FR_ISPASS(x)	(((x) & FR_CMDMASK) == FR_PASS)
841#define	FR_ISAUTH(x)	(((x) & FR_CMDMASK) == FR_AUTH)
842#define	FR_ISPREAUTH(x)	(((x) & FR_CMDMASK) == FR_PREAUTH)
843#define	FR_ISACCOUNT(x)	(((x) & FR_CMDMASK) == FR_ACCOUNT)
844#define	FR_ISSKIP(x)	(((x) & FR_CMDMASK) == FR_SKIP)
845#define	FR_ISDECAPS(x)	(((x) & FR_CMDMASK) == FR_DECAPSULATE)
846#define	FR_ISNOMATCH(x)	((x) & FR_NOMATCH)
847#define	FR_INOUT	(FR_INQUE|FR_OUTQUE)
848
849/*
850 * recognized flags for SIOCGETFF and SIOCSETFF, and get put in fr_flags
851 */
852#define	FF_LOGPASS	0x10000000
853#define	FF_LOGBLOCK	0x20000000
854#define	FF_LOGNOMATCH	0x40000000
855#define	FF_LOGGING	(FF_LOGPASS|FF_LOGBLOCK|FF_LOGNOMATCH)
856#define	FF_BLOCKNONIP	0x80000000	/* Solaris2 Only */
857
858
859/*
860 * Structure that passes information on what/how to flush to the kernel.
861 */
862typedef	struct	ipfflush	{
863	int		ipflu_how;
864	int		ipflu_arg;
865} ipfflush_t;
866
867
868/*
869 *
870 */
871typedef	struct	ipfgetctl	{
872	u_int		ipfg_min;	/* min value */
873	u_int		ipfg_current;	/* current value */
874	u_int		ipfg_max;	/* max value */
875	u_int		ipfg_default;	/* default value */
876	u_int		ipfg_steps;	/* value increments */
877	char		ipfg_name[40];	/* tag name for this control */
878} ipfgetctl_t;
879
880typedef	struct	ipfsetctl	{
881	int	ipfs_which;	/* 0 = min 1 = current 2 = max 3 = default */
882	u_int	ipfs_value;	/* min value */
883	char	ipfs_name[40];	/* tag name for this control */
884} ipfsetctl_t;
885
886
887/*
888 * Some of the statistics below are in their own counters, but most are kept
889 * in this single structure so that they can all easily be collected and
890 * copied back as required.
891 */
892typedef	struct	ipf_statistics {
893	u_long	fr_icmp_coalesce;
894	u_long	fr_tcp_frag;
895	u_long	fr_tcp_pullup;
896	u_long	fr_tcp_short;
897	u_long	fr_tcp_small;
898	u_long	fr_tcp_bad_flags;
899	u_long	fr_udp_pullup;
900	u_long	fr_ip_freed;
901	u_long	fr_v6_ah_bad;
902	u_long	fr_v6_bad;
903	u_long	fr_v6_badfrag;
904	u_long	fr_v6_dst_bad;
905	u_long	fr_v6_esp_pullup;
906	u_long	fr_v6_ext_short;
907	u_long	fr_v6_ext_pullup;
908	u_long	fr_v6_ext_hlen;
909	u_long	fr_v6_frag_bad;
910	u_long	fr_v6_frag_pullup;
911	u_long	fr_v6_frag_size;
912	u_long	fr_v6_gre_pullup;
913	u_long	fr_v6_icmp6_pullup;
914	u_long	fr_v6_rh_bad;
915	u_long	fr_v6_badttl;	/* TTL in packet doesn't reach minimum */
916	u_long	fr_v4_ah_bad;
917	u_long	fr_v4_ah_pullup;
918	u_long	fr_v4_esp_pullup;
919	u_long	fr_v4_cipso_bad;
920	u_long	fr_v4_cipso_tlen;
921	u_long	fr_v4_gre_frag;
922	u_long	fr_v4_gre_pullup;
923	u_long	fr_v4_icmp_frag;
924	u_long	fr_v4_icmp_pullup;
925	u_long	fr_v4_badttl;	/* TTL in packet doesn't reach minimum */
926	u_long	fr_v4_badsrc;	/* source received doesn't match route */
927	u_long	fr_l4_badcksum;	/* layer 4 header checksum failure */
928	u_long	fr_badcoalesces;
929	u_long	fr_pass;	/* packets allowed */
930	u_long	fr_block;	/* packets denied */
931	u_long	fr_nom;		/* packets which don't match any rule */
932	u_long	fr_short;	/* packets which are short */
933	u_long	fr_ppkl;	/* packets allowed and logged */
934	u_long	fr_bpkl;	/* packets denied and logged */
935	u_long	fr_npkl;	/* packets unmatched and logged */
936	u_long	fr_ret;		/* packets for which a return is sent */
937	u_long	fr_acct;	/* packets for which counting was performed */
938	u_long	fr_bnfr;	/* bad attempts to allocate fragment state */
939	u_long	fr_nfr;		/* new fragment state kept */
940	u_long	fr_cfr;		/* add new fragment state but complete pkt */
941	u_long	fr_bads;	/* bad attempts to allocate packet state */
942	u_long	fr_ads;		/* new packet state kept */
943	u_long	fr_chit;	/* cached hit */
944	u_long	fr_cmiss;	/* cached miss */
945	u_long	fr_tcpbad;	/* TCP checksum check failures */
946	u_long	fr_pull[2];	/* good and bad pullup attempts */
947	u_long	fr_bad;		/* bad IP packets to the filter */
948	u_long	fr_ipv6;	/* IPv6 packets in/out */
949	u_long	fr_ppshit;	/* dropped because of pps ceiling */
950	u_long	fr_ipud;	/* IP id update failures */
951	u_long	fr_blocked[FRB_MAX_VALUE + 1];
952} ipf_statistics_t;
953
954/*
955 * Log structure.  Each packet header logged is prepended by one of these.
956 * Following this in the log records read from the device will be an ipflog
957 * structure which is then followed by any packet data.
958 */
959typedef	struct	iplog	{
960	u_32_t		ipl_magic;
961	u_int		ipl_count;
962	u_32_t		ipl_seqnum;
963	struct	timeval	ipl_time;
964	size_t		ipl_dsize;
965	struct	iplog	*ipl_next;
966} iplog_t;
967
968#define	ipl_sec		ipl_time.tv_sec
969#define	ipl_usec	ipl_time.tv_usec
970
971#define IPL_MAGIC	0x49504c4d	/* 'IPLM' */
972#define IPL_MAGIC_NAT	0x49504c4e	/* 'IPLN' */
973#define IPL_MAGIC_STATE	0x49504c53	/* 'IPLS' */
974#define	IPLOG_SIZE	sizeof(iplog_t)
975
976typedef	struct	ipflog	{
977	u_int		fl_unit;
978	u_32_t		fl_rule;
979	u_32_t		fl_flags;
980	u_32_t		fl_lflags;
981	u_32_t		fl_logtag;
982	ipftag_t	fl_nattag;
983	u_short		fl_plen;	/* extra data after hlen */
984	u_short		fl_loglevel;	/* syslog log level */
985	char		fl_group[FR_GROUPLEN];
986	u_char		fl_hlen;	/* length of IP headers saved */
987	u_char		fl_dir;
988	u_char		fl_breason;	/* from fin_reason */
989	u_char		fl_family;	/* address family of packet logged */
990	char		fl_ifname[LIFNAMSIZ];
991} ipflog_t;
992
993#ifndef	IPF_LOGGING
994# define	IPF_LOGGING	0
995#endif
996#ifndef	IPF_DEFAULT_PASS
997# define	IPF_DEFAULT_PASS	FR_PASS
998#endif
999
1000#define	DEFAULT_IPFLOGSIZE	32768
1001#ifndef	IPFILTER_LOGSIZE
1002# define	IPFILTER_LOGSIZE	DEFAULT_IPFLOGSIZE
1003#else
1004# if IPFILTER_LOGSIZE < 8192
1005#  error IPFILTER_LOGSIZE too small.  Must be >= 8192
1006# endif
1007#endif
1008
1009#define	IPF_OPTCOPY	0x07ff00	/* bit mask of copied options */
1010
1011/*
1012 * Device filenames for reading log information.  Use ipf on Solaris2 because
1013 * ipl is already a name used by something else.
1014 */
1015#ifndef	IPL_NAME
1016# if	SOLARIS
1017#  define	IPL_NAME	"/dev/ipf"
1018# else
1019#  define	IPL_NAME	"/dev/ipl"
1020# endif
1021#endif
1022/*
1023 * Pathnames for various IP Filter control devices.  Used by LKM
1024 * and userland, so defined here.
1025 */
1026#define	IPNAT_NAME	"/dev/ipnat"
1027#define	IPSTATE_NAME	"/dev/ipstate"
1028#define	IPAUTH_NAME	"/dev/ipauth"
1029#define	IPSYNC_NAME	"/dev/ipsync"
1030#define	IPSCAN_NAME	"/dev/ipscan"
1031#define	IPLOOKUP_NAME	"/dev/iplookup"
1032
1033#define	IPL_LOGIPF	0	/* Minor device #'s for accessing logs */
1034#define	IPL_LOGNAT	1
1035#define	IPL_LOGSTATE	2
1036#define	IPL_LOGAUTH	3
1037#define	IPL_LOGSYNC	4
1038#define	IPL_LOGSCAN	5
1039#define	IPL_LOGLOOKUP	6
1040#define	IPL_LOGCOUNT	7
1041#define	IPL_LOGMAX	7
1042#define	IPL_LOGSIZE	IPL_LOGMAX + 1
1043#define	IPL_LOGALL	-1
1044#define	IPL_LOGNONE	-2
1045
1046/*
1047 * For SIOCGETFS
1048 */
1049typedef	struct	friostat	{
1050	ipf_statistics_t f_st[2];
1051	frentry_t	*f_ipf[2][2];
1052	frentry_t	*f_acct[2][2];
1053	frentry_t	*f_auth;
1054	struct frgroup	*f_groups[IPL_LOGSIZE][2];
1055	u_long		f_froute[2];
1056	u_long		f_log_ok;
1057	u_long		f_log_fail;
1058	u_long		f_rb_no_mem;
1059	u_long		f_rb_node_max;
1060	u_32_t		f_ticks;
1061	int		f_locks[IPL_LOGSIZE];
1062	int		f_defpass;	/* default pass - from fr_pass */
1063	int		f_active;	/* 1 or 0 - active rule set */
1064	int		f_running;	/* 1 if running, else 0 */
1065	int		f_logging;	/* 1 if enabled, else 0 */
1066	int		f_features;
1067	char		f_version[32];	/* version string */
1068} friostat_t;
1069
1070#define	f_fin		f_ipf[0]
1071#define	f_fout		f_ipf[1]
1072#define	f_acctin	f_acct[0]
1073#define	f_acctout	f_acct[1]
1074
1075#define	IPF_FEAT_LKM		0x001
1076#define	IPF_FEAT_LOG		0x002
1077#define	IPF_FEAT_LOOKUP		0x004
1078#define	IPF_FEAT_BPF		0x008
1079#define	IPF_FEAT_COMPILED	0x010
1080#define	IPF_FEAT_CKSUM		0x020
1081#define	IPF_FEAT_SYNC		0x040
1082#define	IPF_FEAT_SCAN		0x080
1083#define	IPF_FEAT_IPV6		0x100
1084
1085typedef struct	optlist {
1086	u_short ol_val;
1087	int	ol_bit;
1088} optlist_t;
1089
1090
1091/*
1092 * Group list structure.
1093 */
1094typedef	struct frgroup {
1095	struct frgroup	*fg_next;
1096	struct frentry	*fg_head;
1097	struct frentry	*fg_start;
1098	struct frgroup	**fg_set;
1099	u_32_t		fg_flags;
1100	int		fg_ref;
1101	char		fg_name[FR_GROUPLEN];
1102} frgroup_t;
1103
1104#define	FG_NAME(g)	(*(g)->fg_name == '\0' ? "" : (g)->fg_name)
1105
1106
1107/*
1108 * Used by state and NAT tables
1109 */
1110typedef struct icmpinfo {
1111	u_short		ici_id;
1112	u_short		ici_seq;
1113	u_char		ici_type;
1114} icmpinfo_t;
1115
1116typedef struct udpinfo {
1117	u_short		us_sport;
1118	u_short		us_dport;
1119} udpinfo_t;
1120
1121
1122typedef	struct	tcpdata	{
1123	u_32_t		td_end;
1124	u_32_t		td_maxend;
1125	u_32_t		td_maxwin;
1126	u_32_t		td_winscale;
1127	u_32_t		td_maxseg;
1128	int		td_winflags;
1129} tcpdata_t;
1130
1131#define	TCP_WSCALE_MAX		14
1132
1133#define	TCP_WSCALE_SEEN		0x00000001
1134#define	TCP_WSCALE_FIRST	0x00000002
1135#define	TCP_SACK_PERMIT		0x00000004
1136
1137
1138typedef	struct tcpinfo {
1139	u_32_t		ts_sport;
1140	u_32_t		ts_dport;
1141	tcpdata_t	ts_data[2];
1142} tcpinfo_t;
1143
1144
1145/*
1146 * Structures to define a GRE header as seen in a packet.
1147 */
1148struct	grebits	{
1149#if defined(sparc)
1150	u_32_t		grb_ver:3;
1151	u_32_t		grb_flags:3;
1152	u_32_t		grb_A:1;
1153	u_32_t		grb_recur:1;
1154	u_32_t		grb_s:1;
1155	u_32_t		grb_S:1;
1156	u_32_t		grb_K:1;
1157	u_32_t		grb_R:1;
1158	u_32_t		grb_C:1;
1159#else
1160	u_32_t		grb_C:1;
1161	u_32_t		grb_R:1;
1162	u_32_t		grb_K:1;
1163	u_32_t		grb_S:1;
1164	u_32_t		grb_s:1;
1165	u_32_t		grb_recur:1;
1166	u_32_t		grb_A:1;
1167	u_32_t		grb_flags:3;
1168	u_32_t		grb_ver:3;
1169#endif
1170	u_short		grb_ptype;
1171};
1172
1173typedef	struct	grehdr	{
1174	union	{
1175		struct	grebits	gru_bits;
1176		u_short	gru_flags;
1177	} gr_un;
1178	u_short		gr_len;
1179	u_short		gr_call;
1180} grehdr_t;
1181
1182#define	gr_flags	gr_un.gru_flags
1183#define	gr_bits		gr_un.gru_bits
1184#define	gr_ptype	gr_bits.grb_ptype
1185#define	gr_C		gr_bits.grb_C
1186#define	gr_R		gr_bits.grb_R
1187#define	gr_K		gr_bits.grb_K
1188#define	gr_S		gr_bits.grb_S
1189#define	gr_s		gr_bits.grb_s
1190#define	gr_recur	gr_bits.grb_recur
1191#define	gr_A		gr_bits.grb_A
1192#define	gr_ver		gr_bits.grb_ver
1193
1194/*
1195 * GRE information tracked by "keep state"
1196 */
1197typedef	struct	greinfo	{
1198	u_short		gs_call[2];
1199	u_short		gs_flags;
1200	u_short		gs_ptype;
1201} greinfo_t;
1202
1203#define	GRE_REV(x)	((ntohs(x) >> 13) & 7)
1204
1205
1206/*
1207 * Format of an Authentication header
1208 */
1209typedef	struct	authhdr	{
1210	u_char		ah_next;
1211	u_char		ah_plen;
1212	u_short		ah_reserved;
1213	u_32_t		ah_spi;
1214	u_32_t		ah_seq;
1215	/* Following the sequence number field is 0 or more bytes of */
1216	/* authentication data, as specified by ah_plen - RFC 2402.  */
1217} authhdr_t;
1218
1219
1220/*
1221 * Timeout tail queue list member
1222 */
1223typedef	struct	ipftqent	{
1224	struct ipftqent **tqe_pnext;
1225	struct ipftqent *tqe_next;
1226	struct	ipftq	*tqe_ifq;
1227	void		*tqe_parent;	/* pointer back to NAT/state struct */
1228	u_32_t		tqe_die;	/* when this entriy is to die */
1229	u_32_t		tqe_touched;
1230	int		tqe_flags;
1231	int		tqe_state[2];	/* current state of this entry */
1232} ipftqent_t;
1233
1234#define	TQE_RULEBASED	0x00000001
1235#define	TQE_DELETE	0x00000002
1236
1237
1238/*
1239 * Timeout tail queue head for IPFilter
1240 */
1241typedef struct  ipftq   {
1242	ipfmutex_t	ifq_lock;
1243	u_int		ifq_ttl;
1244	ipftqent_t	*ifq_head;
1245	ipftqent_t	**ifq_tail;
1246	struct ipftq	*ifq_next;
1247	struct ipftq	**ifq_pnext;
1248	int		ifq_ref;
1249	u_int		ifq_flags;
1250} ipftq_t;
1251
1252#define	IFQF_USER	0x01		/* User defined aging */
1253#define	IFQF_DELETE	0x02		/* Marked for deletion */
1254#define	IFQF_PROXY	0x04		/* Timeout queue in use by a proxy */
1255
1256#define	IPFTQ_INIT(x,y,z)	do {			\
1257					(x)->ifq_ttl = (y);	\
1258					(x)->ifq_head = NULL;	\
1259					(x)->ifq_ref = 1;	\
1260					(x)->ifq_tail = &(x)->ifq_head; \
1261					MUTEX_INIT(&(x)->ifq_lock, (z)); \
1262				} while (0)
1263
1264#define	IPF_HZ_MULT	1
1265#define	IPF_HZ_DIVIDE	2		/* How many times a second ipfilter */
1266					/* checks its timeout queues.       */
1267#define	IPF_TTLVAL(x)	(((x) / IPF_HZ_MULT) * IPF_HZ_DIVIDE)
1268
1269typedef	int	(*ipftq_delete_fn_t)(struct ipf_main_softc_s *, void *);
1270
1271
1272/*
1273 * Object structure description.  For passing through in ioctls.
1274 */
1275typedef	struct	ipfobj	{
1276	u_32_t		ipfo_rev;	/* IPFilter version number */
1277	u_32_t		ipfo_size;	/* size of object at ipfo_ptr */
1278	void		*ipfo_ptr;	/* pointer to object */
1279	int		ipfo_type;	/* type of object being pointed to */
1280	int		ipfo_offset;	/* bytes from ipfo_ptr where to start */
1281	int		ipfo_retval;	/* return value */
1282	u_char		ipfo_xxxpad[28];	/* reserved for future use */
1283} ipfobj_t;
1284
1285#define	IPFOBJ_FRENTRY		0	/* struct frentry */
1286#define	IPFOBJ_IPFSTAT		1	/* struct friostat */
1287#define	IPFOBJ_IPFINFO		2	/* struct fr_info */
1288#define	IPFOBJ_AUTHSTAT		3	/* struct fr_authstat */
1289#define	IPFOBJ_FRAGSTAT		4	/* struct ipfrstat */
1290#define	IPFOBJ_IPNAT		5	/* struct ipnat */
1291#define	IPFOBJ_NATSTAT		6	/* struct natstat */
1292#define	IPFOBJ_STATESAVE	7	/* struct ipstate_save */
1293#define	IPFOBJ_NATSAVE		8	/* struct nat_save */
1294#define	IPFOBJ_NATLOOKUP	9	/* struct natlookup */
1295#define	IPFOBJ_IPSTATE		10	/* struct ipstate */
1296#define	IPFOBJ_STATESTAT	11	/* struct ips_stat */
1297#define	IPFOBJ_FRAUTH		12	/* struct frauth */
1298#define	IPFOBJ_TUNEABLE		13	/* struct ipftune */
1299#define	IPFOBJ_NAT		14	/* struct nat */
1300#define	IPFOBJ_IPFITER		15	/* struct ipfruleiter */
1301#define	IPFOBJ_GENITER		16	/* struct ipfgeniter */
1302#define	IPFOBJ_GTABLE		17	/* struct ipftable */
1303#define	IPFOBJ_LOOKUPITER	18	/* struct ipflookupiter */
1304#define	IPFOBJ_STATETQTAB	19	/* struct ipftq * NSTATES */
1305#define	IPFOBJ_IPFEXPR		20
1306#define	IPFOBJ_PROXYCTL		21	/* strct ap_ctl */
1307#define	IPFOBJ_FRIPF		22	/* structfripf */
1308#define	IPFOBJ_COUNT		23	/* How many #defines are above this? */
1309
1310
1311typedef	union	ipftunevalptr	{
1312	void		*ipftp_void;
1313	u_long		*ipftp_long;
1314	u_int		*ipftp_int;
1315	u_short		*ipftp_short;
1316	u_char		*ipftp_char;
1317	u_long		ipftp_offset;
1318} ipftunevalptr_t;
1319
1320typedef	union	ipftuneval	{
1321	u_long		ipftu_long;
1322	u_int		ipftu_int;
1323	u_short		ipftu_short;
1324	u_char		ipftu_char;
1325} ipftuneval_t;
1326
1327struct ipftuneable;
1328typedef	int (* ipftunefunc_t)(struct ipf_main_softc_s *, struct ipftuneable *, ipftuneval_t *);
1329
1330typedef	struct	ipftuneable	{
1331	ipftunevalptr_t	ipft_una;
1332	const char	*ipft_name;
1333	u_long		ipft_min;
1334	u_long		ipft_max;
1335	int		ipft_sz;
1336	int		ipft_flags;
1337	struct ipftuneable *ipft_next;
1338	ipftunefunc_t	ipft_func;
1339} ipftuneable_t;
1340
1341#define	ipft_addr	ipft_una.ipftp_void
1342#define	ipft_plong	ipft_una.ipftp_long
1343#define	ipft_pint	ipft_una.ipftp_int
1344#define	ipft_pshort	ipft_una.ipftp_short
1345#define	ipft_pchar	ipft_una.ipftp_char
1346
1347#define	IPFT_RDONLY	1	/* read-only */
1348#define	IPFT_WRDISABLED	2	/* write when disabled only */
1349
1350typedef	struct	ipftune	{
1351	void    	*ipft_cookie;
1352	ipftuneval_t	ipft_un;
1353	u_long  	ipft_min;
1354	u_long  	ipft_max;
1355	int		ipft_sz;
1356	int		ipft_flags;
1357	char		ipft_name[80];
1358} ipftune_t;
1359
1360#define	ipft_vlong	ipft_un.ipftu_long
1361#define	ipft_vint	ipft_un.ipftu_int
1362#define	ipft_vshort	ipft_un.ipftu_short
1363#define	ipft_vchar	ipft_un.ipftu_char
1364
1365/*
1366 * Hash table header
1367 */
1368#define	IPFHASH(x,y)	typedef struct { 			\
1369				ipfrwlock_t	ipfh_lock;	\
1370				struct	x	*ipfh_head;	\
1371				} y
1372
1373/*
1374** HPUX Port
1375*/
1376
1377#if !defined(CDEV_MAJOR) && defined (__FreeBSD_version)
1378# define	CDEV_MAJOR	79
1379#endif
1380
1381#ifdef _KERNEL
1382# define	FR_VERBOSE(verb_pr)
1383# define	FR_DEBUG(verb_pr)
1384#else
1385extern	void	ipfkdebug(char *, ...);
1386extern	void	ipfkverbose(char *, ...);
1387# define	FR_VERBOSE(verb_pr)	ipfkverbose verb_pr
1388# define	FR_DEBUG(verb_pr)	ipfkdebug verb_pr
1389#endif
1390
1391/*
1392 *
1393 */
1394typedef	struct	ipfruleiter {
1395	int		iri_inout;
1396	char		iri_group[FR_GROUPLEN];
1397	int		iri_active;
1398	int		iri_nrules;
1399	int		iri_v;		/* No longer used (compatibility) */
1400	frentry_t	*iri_rule;
1401} ipfruleiter_t;
1402
1403/*
1404 * Values for iri_inout
1405 */
1406#define	F_IN	0
1407#define	F_OUT	1
1408#define	F_ACIN	2
1409#define	F_ACOUT	3
1410
1411
1412typedef	struct	ipfgeniter {
1413	int	igi_type;
1414	int	igi_nitems;
1415	void	*igi_data;
1416} ipfgeniter_t;
1417
1418#define	IPFGENITER_IPF		0
1419#define	IPFGENITER_NAT		1
1420#define	IPFGENITER_IPNAT	2
1421#define	IPFGENITER_FRAG		3
1422#define	IPFGENITER_AUTH		4
1423#define	IPFGENITER_STATE	5
1424#define	IPFGENITER_NATFRAG	6
1425#define	IPFGENITER_HOSTMAP	7
1426#define	IPFGENITER_LOOKUP	8
1427
1428typedef	struct	ipftable {
1429	int	ita_type;
1430	void	*ita_table;
1431} ipftable_t;
1432
1433#define	IPFTABLE_BUCKETS	1
1434#define	IPFTABLE_BUCKETS_NATIN	2
1435#define	IPFTABLE_BUCKETS_NATOUT	3
1436
1437
1438typedef struct ipf_v4_masktab_s {
1439	u_32_t	imt4_active[33];
1440	int	imt4_masks[33];
1441	int	imt4_max;
1442} ipf_v4_masktab_t;
1443
1444typedef struct ipf_v6_masktab_s {
1445	i6addr_t	imt6_active[129];
1446	int		imt6_masks[129];
1447	int		imt6_max;
1448} ipf_v6_masktab_t;
1449
1450
1451/*
1452 *
1453 */
1454typedef struct ipftoken {
1455	struct ipftoken	*ipt_next;
1456	struct ipftoken	**ipt_pnext;
1457	void		*ipt_ctx;
1458	void		*ipt_data;
1459	u_long		ipt_die;
1460	int		ipt_type;
1461	int		ipt_uid;
1462	int		ipt_subtype;
1463	int		ipt_ref;
1464	int		ipt_complete;
1465} ipftoken_t;
1466
1467
1468/*
1469 *
1470 */
1471typedef struct ipfexp {
1472	int		ipfe_cmd;
1473	int		ipfe_not;
1474	int		ipfe_narg;
1475	int		ipfe_size;
1476	int		ipfe_arg0[1];
1477} ipfexp_t;
1478
1479/*
1480 * Currently support commands (ipfe_cmd)
1481 * 32bits is split up follows:
1482 * aabbcccc
1483 * aa = 0 = packet matching, 1 = meta data matching
1484 * bb = IP protocol number
1485 * cccc = command
1486 */
1487#define	IPF_EXP_IP_PR		0x00000001
1488#define	IPF_EXP_IP_ADDR		0x00000002
1489#define	IPF_EXP_IP_SRCADDR	0x00000003
1490#define	IPF_EXP_IP_DSTADDR	0x00000004
1491#define	IPF_EXP_IP6_ADDR	0x00000005
1492#define	IPF_EXP_IP6_SRCADDR	0x00000006
1493#define	IPF_EXP_IP6_DSTADDR	0x00000007
1494#define	IPF_EXP_TCP_FLAGS	0x00060001
1495#define	IPF_EXP_TCP_PORT	0x00060002
1496#define	IPF_EXP_TCP_SPORT	0x00060003
1497#define	IPF_EXP_TCP_DPORT	0x00060004
1498#define	IPF_EXP_UDP_PORT	0x00110002
1499#define	IPF_EXP_UDP_SPORT	0x00110003
1500#define	IPF_EXP_UDP_DPORT	0x00110004
1501#define	IPF_EXP_IDLE_GT		0x01000001
1502#define	IPF_EXP_TCP_STATE	0x01060002
1503#define	IPF_EXP_END		0xffffffff
1504
1505#define	ONE_DAY			IPF_TTLVAL(1 * 86400)   /* 1 day */
1506#define	FIVE_DAYS		(5 * ONE_DAY)
1507
1508typedef struct ipf_main_softc_s {
1509	struct ipf_main_softc_s *ipf_next;
1510	ipfmutex_t	ipf_rw;
1511	ipfmutex_t      ipf_timeoutlock;
1512	ipfrwlock_t     ipf_mutex;
1513	ipfrwlock_t	ipf_frag;
1514	ipfrwlock_t	ipf_global;
1515	ipfrwlock_t	ipf_tokens;
1516	ipfrwlock_t	ipf_state;
1517	ipfrwlock_t	ipf_nat;
1518	ipfrwlock_t	ipf_natfrag;
1519	ipfrwlock_t	ipf_poolrw;
1520	int		ipf_dynamic_softc;
1521	int		ipf_refcnt;
1522	int		ipf_running;
1523	int		ipf_flags;
1524	int		ipf_active;
1525	int		ipf_control_forwarding;
1526	int		ipf_update_ipid;
1527	int		ipf_chksrc;	/* causes a system crash if enabled */
1528	int		ipf_pass;
1529	int		ipf_minttl;
1530	int		ipf_icmpminfragmtu;
1531	int		ipf_interror;	/* Should be in a struct that is per  */
1532					/* thread or process. Does not belong */
1533					/* here but there's a lot more work   */
1534					/* in doing that properly. For now,   */
1535					/* it is squatting. */
1536	u_int		ipf_tcpidletimeout;
1537	u_int		ipf_tcpclosewait;
1538	u_int		ipf_tcplastack;
1539	u_int		ipf_tcptimewait;
1540	u_int		ipf_tcptimeout;
1541	u_int		ipf_tcpsynsent;
1542	u_int		ipf_tcpsynrecv;
1543	u_int		ipf_tcpclosed;
1544	u_int		ipf_tcphalfclosed;
1545	u_int		ipf_udptimeout;
1546	u_int		ipf_udpacktimeout;
1547	u_int		ipf_icmptimeout;
1548	u_int		ipf_icmpacktimeout;
1549	u_int		ipf_iptimeout;
1550	u_long		ipf_ticks;
1551	u_long		ipf_userifqs;
1552	u_long		ipf_rb_no_mem;
1553	u_long		ipf_rb_node_max;
1554	u_long		ipf_frouteok[2];
1555	ipftuneable_t	*ipf_tuners;
1556	void		*ipf_frag_soft;
1557	void		*ipf_nat_soft;
1558	void		*ipf_state_soft;
1559	void		*ipf_auth_soft;
1560	void		*ipf_proxy_soft;
1561	void		*ipf_sync_soft;
1562	void		*ipf_lookup_soft;
1563	void		*ipf_log_soft;
1564	struct frgroup	*ipf_groups[IPL_LOGSIZE][2];
1565	frentry_t	*ipf_rules[2][2];
1566	frentry_t	*ipf_acct[2][2];
1567	frentry_t	*ipf_rule_explist[2];
1568	ipftoken_t	*ipf_token_head;
1569	ipftoken_t	**ipf_token_tail;
1570#if defined(__FreeBSD_version) && defined(_KERNEL)
1571	struct callout ipf_slow_ch;
1572#endif
1573#if NETBSD_GE_REV(104040000)
1574	struct callout	ipf_slow_ch;
1575#endif
1576#if SOLARIS
1577	timeout_id_t	ipf_slow_ch;
1578#endif
1579#if defined(_KERNEL)
1580# if SOLARIS
1581	struct pollhead	ipf_poll_head[IPL_LOGSIZE];
1582	void		*ipf_dip;
1583#  if defined(INSTANCES)
1584	int		ipf_get_loopback;
1585	u_long		ipf_idnum;
1586	net_handle_t	ipf_nd_v4;
1587	net_handle_t	ipf_nd_v6;
1588	hook_t		*ipf_hk_v4_in;
1589	hook_t		*ipf_hk_v4_out;
1590	hook_t		*ipf_hk_v4_nic;
1591	hook_t		*ipf_hk_v6_in;
1592	hook_t		*ipf_hk_v6_out;
1593	hook_t		*ipf_hk_v6_nic;
1594	hook_t		*ipf_hk_loop_v4_in;
1595	hook_t		*ipf_hk_loop_v4_out;
1596	hook_t		*ipf_hk_loop_v6_in;
1597	hook_t		*ipf_hk_loop_v6_out;
1598#  endif
1599# else
1600	struct selinfo	ipf_selwait[IPL_LOGSIZE];
1601# endif
1602#endif
1603	void		*ipf_slow;
1604	ipf_statistics_t ipf_stats[2];
1605	u_char		ipf_iss_secret[32];
1606	u_short		ipf_ip_id;
1607} ipf_main_softc_t;
1608
1609#define	IPFERROR(_e)	do { softc->ipf_interror = (_e); \
1610			     DT1(user_error, int, _e); \
1611			} while (0)
1612
1613#ifndef	_KERNEL
1614extern	int	ipf_check(void *, struct ip *, int, struct ifnet *, int, mb_t **);
1615extern	struct	ifnet *get_unit(char *, int);
1616extern	char	*get_ifname(struct ifnet *);
1617extern	int	ipfioctl(ipf_main_softc_t *, int, ioctlcmd_t,
1618			      caddr_t, int);
1619extern	void	m_freem(mb_t *);
1620extern	size_t	msgdsize(mb_t *);
1621extern	int	bcopywrap(void *, void *, size_t);
1622extern	void	ip_fillid(struct ip *);
1623#else /* #ifndef _KERNEL */
1624# if defined(__NetBSD__) && defined(PFIL_HOOKS)
1625extern	void	ipfilterattach(int);
1626# endif
1627extern	int	ipl_enable(void);
1628extern	int	ipl_disable(void);
1629# ifdef MENTAT
1630/* XXX MENTAT is always defined for Solaris */
1631extern	int	ipf_check(void *, struct ip *, int, struct ifnet *, int, void *,
1632			       mblk_t **);
1633#  if SOLARIS
1634extern	void	ipf_prependmbt(fr_info_t *, mblk_t *);
1635extern	int	ipfioctl(dev_t, int, intptr_t, int, cred_t *, int *);
1636#  endif
1637extern	int	ipf_qout(queue_t *, mblk_t *);
1638# else /* MENTAT */
1639/* XXX MENTAT is never defined for FreeBSD & NetBSD */
1640extern	int	ipf_check(void *, struct ip *, int, struct ifnet *, int, mb_t **);
1641extern	int	(*fr_checkp)(ip_t *, int, void *, int, mb_t **);
1642extern	size_t	mbufchainlen(mb_t *);
1643#  ifdef	IPFILTER_LKM
1644extern	int	ipf_identify(char *);
1645#  endif
1646#  if defined(__FreeBSD_version)
1647extern	int	ipfioctl(struct cdev*, u_long, caddr_t, int, struct thread *);
1648#  elif defined(__NetBSD__)
1649extern	int	ipfioctl(dev_t, u_long, void *, int, struct lwp *);
1650#  endif
1651# endif /* MENTAT */
1652
1653# if defined(__FreeBSD_version)
1654extern	int	ipf_pfil_hook(void);
1655extern	int	ipf_pfil_unhook(void);
1656extern	void	ipf_event_reg(void);
1657extern	void	ipf_event_dereg(void);
1658# endif
1659
1660# if defined(INSTANCES)
1661extern	ipf_main_softc_t	*ipf_find_softc(u_long);
1662extern	int	ipf_set_loopback(ipf_main_softc_t *, ipftuneable_t *,
1663				      ipftuneval_t *);
1664# endif
1665
1666#endif /* #ifndef _KERNEL */
1667
1668extern	char	*memstr(const char *, char *, size_t, size_t);
1669extern	int	count4bits(u_32_t);
1670#ifdef USE_INET6
1671extern	int	count6bits(u_32_t *);
1672#endif
1673extern	int	frrequest(ipf_main_softc_t *, int, ioctlcmd_t, caddr_t,
1674			       int, int);
1675extern	char	*getifname(struct ifnet *);
1676extern	int	ipfattach(ipf_main_softc_t *);
1677extern	int	ipfdetach(ipf_main_softc_t *);
1678extern	u_short	ipf_cksum(u_short *, int);
1679extern	int	copyinptr(ipf_main_softc_t *, void *, void *, size_t);
1680extern	int	copyoutptr(ipf_main_softc_t *, void *, void *, size_t);
1681extern	int	ipf_fastroute(mb_t *, mb_t **, fr_info_t *, frdest_t *);
1682extern	int	ipf_inject(fr_info_t *, mb_t *);
1683extern	int	ipf_inobj(ipf_main_softc_t *, void *, ipfobj_t *,
1684			       void *, int);
1685extern	int	ipf_inobjsz(ipf_main_softc_t *, void *, void *,
1686				 int , int);
1687extern	int	ipf_ioctlswitch(ipf_main_softc_t *, int, void *,
1688				     ioctlcmd_t, int, int, void *);
1689extern	int	ipf_ipf_ioctl(ipf_main_softc_t *, caddr_t, ioctlcmd_t,
1690				   int, int, void *);
1691extern	int	ipf_ipftune(ipf_main_softc_t *, ioctlcmd_t, void *);
1692extern	int	ipf_matcharray_load(ipf_main_softc_t *, caddr_t,
1693					 ipfobj_t *, int **);
1694extern	int	ipf_matcharray_verify(int *, int);
1695extern	int	ipf_outobj(ipf_main_softc_t *, void *, void *, int);
1696extern	int	ipf_outobjk(ipf_main_softc_t *, ipfobj_t *, void *);
1697extern	int	ipf_outobjsz(ipf_main_softc_t *, void *, void *,
1698				  int, int);
1699extern	void	*ipf_pullup(mb_t *, fr_info_t *, int);
1700extern	int	ipf_resolvedest(ipf_main_softc_t *, char *,
1701				     struct frdest *, int);
1702extern	int	ipf_resolvefunc(ipf_main_softc_t *, void *);
1703extern	void	*ipf_resolvenic(ipf_main_softc_t *, char *, int);
1704extern	int	ipf_send_icmp_err(int, fr_info_t *, int);
1705extern	int	ipf_send_reset(fr_info_t *);
1706extern	void	ipf_apply_timeout(ipftq_t *, u_int);
1707extern	ipftq_t	*ipf_addtimeoutqueue(ipf_main_softc_t *, ipftq_t **,
1708					  u_int);
1709extern	void	ipf_deletequeueentry(ipftqent_t *);
1710extern	int	ipf_deletetimeoutqueue(ipftq_t *);
1711extern	void	ipf_freetimeoutqueue(ipf_main_softc_t *, ipftq_t *);
1712extern	void	ipf_movequeue(u_long, ipftqent_t *, ipftq_t *,
1713				   ipftq_t *);
1714extern	void	ipf_queueappend(u_long, ipftqent_t *, ipftq_t *, void *);
1715extern	void	ipf_queueback(u_long, ipftqent_t *);
1716extern	int	ipf_queueflush(ipf_main_softc_t *, ipftq_delete_fn_t,
1717				    ipftq_t *, ipftq_t *, u_int *, int, int);
1718extern	void	ipf_queuefront(ipftqent_t *);
1719extern	int	ipf_settimeout_tcp(ipftuneable_t *, ipftuneval_t *,
1720					ipftq_t *);
1721extern	int	ipf_checkv4sum(fr_info_t *);
1722extern	int	ipf_checkl4sum(fr_info_t *);
1723extern	int	ipf_ifpfillv4addr(int, struct sockaddr_in *,
1724				      struct sockaddr_in *, struct in_addr *,
1725				      struct in_addr *);
1726extern	int	ipf_coalesce(fr_info_t *);
1727#ifdef	USE_INET6
1728extern	int	ipf_checkv6sum(fr_info_t *);
1729extern	int	ipf_ifpfillv6addr(int, struct sockaddr_in6 *,
1730				      struct sockaddr_in6 *, i6addr_t *,
1731				      i6addr_t *);
1732#endif
1733
1734extern	int	ipf_tune_add(ipf_main_softc_t *, ipftuneable_t *);
1735extern	int	ipf_tune_add_array(ipf_main_softc_t *, ipftuneable_t *);
1736extern	int	ipf_tune_del(ipf_main_softc_t *, ipftuneable_t *);
1737extern	int	ipf_tune_del_array(ipf_main_softc_t *, ipftuneable_t *);
1738extern	int	ipf_tune_array_link(ipf_main_softc_t *, ipftuneable_t *);
1739extern	int	ipf_tune_array_unlink(ipf_main_softc_t *,
1740					   ipftuneable_t *);
1741extern	ipftuneable_t *ipf_tune_array_copy(void *, size_t,
1742						ipftuneable_t *);
1743
1744extern int	ipf_pr_pullup(fr_info_t *, int);
1745
1746extern	int	ipf_flush(ipf_main_softc_t *, minor_t, int);
1747extern	frgroup_t *ipf_group_add(ipf_main_softc_t *, char *, void *,
1748				      u_32_t, minor_t, int);
1749extern	void	ipf_group_del(ipf_main_softc_t *, frgroup_t *,
1750				   frentry_t *);
1751extern	int	ipf_derefrule(ipf_main_softc_t *, frentry_t **);
1752extern	frgroup_t *ipf_findgroup(ipf_main_softc_t *, char *, minor_t,
1753				      int, frgroup_t ***);
1754
1755extern	int	ipf_log_init(void);
1756extern	int	ipf_log_bytesused(ipf_main_softc_t *, int);
1757extern	int	ipf_log_canread(ipf_main_softc_t *, int);
1758extern	int	ipf_log_clear(ipf_main_softc_t *, minor_t);
1759extern	u_long  ipf_log_failures(ipf_main_softc_t *, int);
1760extern	int	ipf_log_read(ipf_main_softc_t *, minor_t, uio_t *);
1761extern	int	ipf_log_items(ipf_main_softc_t *, int, fr_info_t *,
1762				   void **, size_t *, int *, int);
1763extern	u_long  ipf_log_logok(ipf_main_softc_t *, int);
1764extern	void	ipf_log_unload(ipf_main_softc_t *);
1765extern	int 	ipf_log_pkt(fr_info_t *, u_int);
1766
1767extern	frentry_t	*ipf_acctpkt(fr_info_t *, u_32_t *);
1768extern	u_short		fr_cksum(fr_info_t *, ip_t *, int, void *);
1769extern	void		ipf_deinitialise(ipf_main_softc_t *);
1770extern	int		ipf_deliverlocal(ipf_main_softc_t *, int, void *,
1771					      i6addr_t *);
1772extern	frentry_t 	*ipf_dstgrpmap(fr_info_t *, u_32_t *);
1773extern	void		ipf_fixskip(frentry_t **, frentry_t *, int);
1774extern	void		ipf_forgetifp(ipf_main_softc_t *, void *);
1775extern	frentry_t 	*ipf_getrulen(ipf_main_softc_t *, int, char *,
1776					   u_32_t);
1777extern	int		ipf_ifpaddr(ipf_main_softc_t *, int, int, void *,
1778					i6addr_t *, i6addr_t *);
1779extern	void		ipf_inet_mask_add(int, ipf_v4_masktab_t *);
1780extern	void		ipf_inet_mask_del(int, ipf_v4_masktab_t *);
1781#ifdef	USE_INET6
1782extern	void		ipf_inet6_mask_add(int, i6addr_t *,
1783						ipf_v6_masktab_t *);
1784extern	void		ipf_inet6_mask_del(int, i6addr_t *,
1785						ipf_v6_masktab_t *);
1786#endif
1787extern	int		ipf_initialise(void);
1788extern	int		ipf_lock(caddr_t, int *);
1789extern  int		ipf_makefrip(int, ip_t *, fr_info_t *);
1790extern	int		ipf_matchtag(ipftag_t *, ipftag_t *);
1791extern	int		ipf_matchicmpqueryreply(int, icmpinfo_t *,
1792						     struct icmp *, int);
1793extern	u_32_t		ipf_newisn(fr_info_t *);
1794extern	u_int		ipf_pcksum(fr_info_t *, int, u_int);
1795#ifdef	USE_INET6
1796extern	u_int		ipf_pcksum6(struct mbuf *, ip6_t *,
1797						u_int32_t, u_int32_t);
1798#endif
1799extern	void		ipf_rule_expire(ipf_main_softc_t *);
1800extern	int		ipf_scanlist(fr_info_t *, u_32_t);
1801extern	frentry_t 	*ipf_srcgrpmap(fr_info_t *, u_32_t *);
1802extern	int		ipf_tcpudpchk(fr_ip_t *, frtuc_t *);
1803extern	int		ipf_verifysrc(fr_info_t *fin);
1804extern	int		ipf_zerostats(ipf_main_softc_t *, char *);
1805extern	int		ipf_getnextrule(ipf_main_softc_t *, ipftoken_t *,
1806					     void *);
1807extern	int		ipf_sync(ipf_main_softc_t *, void *);
1808extern	int		ipf_token_deref(ipf_main_softc_t *, ipftoken_t *);
1809extern	void		ipf_token_expire(ipf_main_softc_t *);
1810extern	ipftoken_t	*ipf_token_find(ipf_main_softc_t *, int, int,
1811					    void *);
1812extern	int		ipf_token_del(ipf_main_softc_t *, int, int,
1813					  void *);
1814extern	void		ipf_token_mark_complete(ipftoken_t *);
1815extern	int		ipf_genericiter(ipf_main_softc_t *, void *,
1816					     int, void *);
1817#ifdef	IPFILTER_LOOKUP
1818extern	void		*ipf_resolvelookup(int, u_int, u_int,
1819						lookupfunc_t *);
1820#endif
1821extern	u_32_t		ipf_random(void);
1822
1823extern	int		ipf_main_load(void);
1824extern	void		*ipf_main_soft_create(void *);
1825extern	void		ipf_main_soft_destroy(ipf_main_softc_t *);
1826extern	int		ipf_main_soft_init(ipf_main_softc_t *);
1827extern	int		ipf_main_soft_fini(ipf_main_softc_t *);
1828extern	int		ipf_main_unload(void);
1829extern	int		ipf_load_all(void);
1830extern	int		ipf_unload_all(void);
1831extern	void		ipf_destroy_all(ipf_main_softc_t *);
1832extern	ipf_main_softc_t *ipf_create_all(void *);
1833extern	int		ipf_init_all(ipf_main_softc_t *);
1834extern	int		ipf_fini_all(ipf_main_softc_t *);
1835extern	void		ipf_log_soft_destroy(ipf_main_softc_t *, void *);
1836extern	void		*ipf_log_soft_create(ipf_main_softc_t *);
1837extern	int		ipf_log_soft_init(ipf_main_softc_t *, void *);
1838extern	int		ipf_log_soft_fini(ipf_main_softc_t *, void *);
1839extern	int		ipf_log_main_load(void);
1840extern	int		ipf_log_main_unload(void);
1841
1842
1843extern	char	ipfilter_version[];
1844#ifdef	USE_INET6
1845extern	int	icmptoicmp6types[ICMP_MAXTYPE+1];
1846extern	int	icmptoicmp6unreach[ICMP_MAX_UNREACH];
1847extern	int	icmpreplytype6[ICMP6_MAXTYPE + 1];
1848#endif
1849#ifdef	IPFILTER_COMPAT
1850extern	int	ipf_in_compat(ipf_main_softc_t *, ipfobj_t *, void *,int);
1851extern	int	ipf_out_compat(ipf_main_softc_t *, ipfobj_t *, void *);
1852#endif
1853extern	int	icmpreplytype4[ICMP_MAXTYPE + 1];
1854
1855extern	int	ipf_ht_node_add(ipf_main_softc_t *, host_track_t *,
1856				     int, i6addr_t *);
1857extern	int	ipf_ht_node_del(host_track_t *, int, i6addr_t *);
1858extern	void	ipf_rb_ht_flush(host_track_t *);
1859extern	void	ipf_rb_ht_freenode(host_node_t *, void *);
1860extern	void	ipf_rb_ht_init(host_track_t *);
1861
1862#endif	/* __IP_FIL_H__ */
1863