ip_fil.h revision 369246
1110476Strhodes/* 266830Sobrien * Copyright (C) 2012 by Darren Reed. 366830Sobrien * 466830Sobrien * See the IPFILTER.LICENCE file for details on licencing. 566830Sobrien * 666830Sobrien * @(#)ip_fil.h 1.35 6/5/96 766830Sobrien * $FreeBSD: stable/11/sys/contrib/ipfilter/netinet/ip_fil.h 369246 2021-02-09 13:47:51Z cy $ 866830Sobrien * Id: ip_fil.h,v 2.170.2.51 2007/10/10 09:48:03 darrenr Exp $ 966830Sobrien */ 1066830Sobrien 1166830Sobrien#ifndef __IP_FIL_H__ 1266830Sobrien#define __IP_FIL_H__ 1366830Sobrien 1466830Sobrien#include <netinet/in.h> 1566830Sobrien 1666830Sobrien#include "netinet/ip_compat.h" 1766830Sobrien#include "netinet/ipf_rb.h" 1866830Sobrien#if NETBSD_GE_REV(104040000) 1966830Sobrien# include <sys/callout.h> 2066830Sobrien#endif 2166830Sobrien#if defined(BSD) && defined(_KERNEL) 2266830Sobrien# include <sys/selinfo.h> 2366830Sobrien#endif 2466830Sobrien 2566830Sobrien#ifndef SOLARIS 2650472Speter# if defined(sun) && defined(__SVR4) 2766830Sobrien# define SOLARIS 1 2815027Sphk# else 2966830Sobrien# define SOLARIS 0 3066830Sobrien# endif 3166830Sobrien#endif 3266830Sobrien 3343849Sjkh#ifndef __P 3481618Sdd# define __P(x) x 3581618Sdd#endif 3681618Sdd 3781618Sdd#define SIOCADAFR _IOW('r', 60, struct ipfobj) 3881618Sdd#define SIOCRMAFR _IOW('r', 61, struct ipfobj) 3981618Sdd#define SIOCSETFF _IOW('r', 62, u_int) 4081618Sdd#define SIOCGETFF _IOR('r', 63, u_int) 4133203Sadam#define SIOCGETFS _IOWR('r', 64, struct ipfobj) 4233203Sadam#define SIOCIPFFL _IOWR('r', 65, int) 4315027Sphk#define SIOCIPFFB _IOR('r', 66, int) 4429300Sdanny#define SIOCADIFR _IOW('r', 67, struct ipfobj) 4529300Sdanny#define SIOCRMIFR _IOW('r', 68, struct ipfobj) 4629300Sdanny#define SIOCSWAPA _IOR('r', 69, u_int) 4729300Sdanny#define SIOCINAFR _IOW('r', 70, struct ipfobj) 4829300Sdanny#define SIOCINIFR _IOW('r', 71, struct ipfobj) 4929300Sdanny#define SIOCFRENB _IOW('r', 72, u_int) 5029300Sdanny#define SIOCFRSYN _IOW('r', 73, u_int) 5115027Sphk#define SIOCFRZST _IOWR('r', 74, struct ipfobj) 5251231Ssheldonh#define SIOCZRLST _IOWR('r', 75, struct ipfobj) 5329300Sdanny#define SIOCAUTHW _IOWR('r', 76, struct ipfobj) 5415027Sphk#define SIOCAUTHR _IOWR('r', 77, struct ipfobj) 5515027Sphk#define SIOCSTAT1 _IOWR('r', 78, struct ipfobj) 5615027Sphk#define SIOCSTLCK _IOWR('r', 79, u_int) 5715027Sphk#define SIOCSTPUT _IOWR('r', 80, struct ipfobj) 5815027Sphk#define SIOCSTGET _IOWR('r', 81, struct ipfobj) 5915027Sphk#define SIOCSTGSZ _IOWR('r', 82, struct ipfobj) 6073023Sdes#define SIOCSTAT2 _IOWR('r', 83, struct ipfobj) 6115210Sphk#define SIOCSETLG _IOWR('r', 84, int) 6215210Sphk#define SIOCGETLG _IOWR('r', 85, int) 6315210Sphk#define SIOCFUNCL _IOWR('r', 86, struct ipfunc_resolve) 6473023Sdes#define SIOCIPFGETNEXT _IOWR('r', 87, struct ipfobj) 6525478Sjkh#define SIOCIPFGET _IOWR('r', 88, struct ipfobj) 6673023Sdes#define SIOCIPFSET _IOWR('r', 89, struct ipfobj) 6715210Sphk#define SIOCIPFL6 _IOWR('r', 90, int) 6815210Sphk#define SIOCIPFITER _IOWR('r', 91, struct ipfobj) 6915210Sphk#define SIOCGENITER _IOWR('r', 92, struct ipfobj) 7015027Sphk#define SIOCGTABL _IOWR('r', 93, struct ipfobj) 7115027Sphk#define SIOCIPFDELTOK _IOWR('r', 94, int) 7215027Sphk#define SIOCLOOKUPITER _IOWR('r', 95, struct ipfobj) 7315027Sphk#define SIOCGTQTAB _IOWR('r', 96, struct ipfobj) 7415027Sphk#define SIOCMATCHFLUSH _IOWR('r', 97, struct ipfobj) 7573023Sdes#define SIOCIPFINTERROR _IOR('r', 98, int) 7625478Sjkh#define SIOCADDFR SIOCADAFR 7773023Sdes#define SIOCDELFR SIOCRMAFR 7815027Sphk#define SIOCINSFR SIOCINAFR 7915027Sphk#define SIOCATHST SIOCSTAT1 8091019Scjc#define SIOCGFRST SIOCSTAT2 8191019Scjc 8291019Scjc 8391019Scjcstruct ipscan; 8491019Scjcstruct ifnet; 8591019Scjcstruct ipf_main_softc_s; 8691019Scjc 8791019Scjctypedef int (* lookupfunc_t)(struct ipf_main_softc_s *, void *, 8891019Scjc int, void *, u_int); 8951231Ssheldonh 9051231Ssheldonh/* 9129300Sdanny * i6addr is used as a container for both IPv4 and IPv6 addresses, as well 9229300Sdanny * as other types of objects, depending on its qualifier. 9315027Sphk */ 9429300Sdannytypedef union i6addr { 9551231Ssheldonh u_32_t i6[4]; 9651231Ssheldonh struct in_addr in4; 9751231Ssheldonh#ifdef USE_INET6 9829300Sdanny struct in6_addr in6; 9951231Ssheldonh#endif 10051231Ssheldonh void *vptr[2]; 10129300Sdanny lookupfunc_t lptr[2]; 10251231Ssheldonh struct { 10351231Ssheldonh u_short type; 10429300Sdanny u_short subtype; 10529300Sdanny int name; 10616578Salex } i6un; 10751231Ssheldonh} i6addr_t; 10850357Ssheldonh 10916578Salex#define in4_addr in4.s_addr 11016578Salex#define iplookupnum i6[1] 11164244Sru#define iplookupname i6un.name 11264244Sru#define iplookuptype i6un.type 11364244Sru#define iplookupsubtype i6un.subtype 11464244Sru/* 11551231Ssheldonh * NOTE: These DO overlap the above on 64bit systems and this IS recognised. 11664244Sru */ 11764244Sru#define iplookupptr vptr[0] 11873842Sobrien#define iplookupfunc lptr[1] 11964244Sru 12065257Sru#define I60(x) (((u_32_t *)(x))[0]) 12164244Sru#define I61(x) (((u_32_t *)(x))[1]) 12264244Sru#define I62(x) (((u_32_t *)(x))[2]) 12364244Sru#define I63(x) (((u_32_t *)(x))[3]) 12464244Sru#define HI60(x) ntohl(((u_32_t *)(x))[0]) 12564244Sru#define HI61(x) ntohl(((u_32_t *)(x))[1]) 12664244Sru#define HI62(x) ntohl(((u_32_t *)(x))[2]) 12764244Sru#define HI63(x) ntohl(((u_32_t *)(x))[3]) 12851231Ssheldonh 12935267Sbrian#define IP6_EQ(a,b) ((I63(a) == I63(b)) && (I62(a) == I62(b)) && \ 13035267Sbrian (I61(a) == I61(b)) && (I60(a) == I60(b))) 13115027Sphk#define IP6_NEQ(a,b) ((I63(a) != I63(b)) || (I62(a) != I62(b)) || \ 13215027Sphk (I61(a) != I61(b)) || (I60(a) != I60(b))) 13351805Smpp#define IP6_ISZERO(a) ((I60(a) | I61(a) | I62(a) | I63(a)) == 0) 13417594Sjkh#define IP6_NOTZERO(a) ((I60(a) | I61(a) | I62(a) | I63(a)) != 0) 13551231Ssheldonh#define IP6_ISONES(a) ((I63(a) == 0xffffffff) && (I62(a) == 0xffffffff) && \ 13650357Ssheldonh (I61(a) == 0xffffffff) && (I60(a) == 0xffffffff)) 13715027Sphk#define IP6_GT(a,b) (ntohl(HI60(a)) > ntohl(HI60(b)) || \ 13815027Sphk (HI60(a) == HI60(b) && \ 13917594Sjkh (ntohl(HI61(a)) > ntohl(HI61(b)) || \ 14051231Ssheldonh (HI61(a) == HI61(b) && \ 14151231Ssheldonh (ntohl(HI62(a)) > ntohl(HI62(b)) || \ 14251231Ssheldonh (HI62(a) == HI62(b) && \ 14391019Scjc ntohl(HI63(a)) > ntohl(HI63(b)))))))) 14450357Ssheldonh#define IP6_LT(a,b) (ntohl(HI60(a)) < ntohl(HI60(b)) || \ 14551231Ssheldonh (HI60(a) == HI60(b) && \ 14654108Sobrien (ntohl(HI61(a)) < ntohl(HI61(b)) || \ 14751231Ssheldonh (HI61(a) == HI61(b) && \ 14851231Ssheldonh (ntohl(HI62(a)) < ntohl(HI62(b)) || \ 14951231Ssheldonh (HI62(a) == HI62(b) && \ 15051231Ssheldonh ntohl(HI63(a)) < ntohl(HI63(b)))))))) 15151231Ssheldonh#define NLADD(n,x) htonl(ntohl(n) + (x)) 15229300Sdanny#define IP6_INC(a) \ 15351231Ssheldonh do { u_32_t *_i6 = (u_32_t *)(a); \ 15456736Srgrimes _i6[3] = NLADD(_i6[3], 1); \ 15551231Ssheldonh if (_i6[3] == 0) { \ 15656736Srgrimes _i6[2] = NLADD(_i6[2], 1); \ 15717594Sjkh if (_i6[2] == 0) { \ 15891019Scjc _i6[1] = NLADD(_i6[1], 1); \ 15991019Scjc if (_i6[1] == 0) { \ 16051231Ssheldonh _i6[0] = NLADD(_i6[0], 1); \ 16151231Ssheldonh } \ 16251231Ssheldonh } \ 16315027Sphk } \ 16451231Ssheldonh } while (0) 16551231Ssheldonh#define IP6_ADD(a,x,d) \ 16615027Sphk do { i6addr_t *_s = (i6addr_t *)(a); \ 16752873Sru i6addr_t *_d = (i6addr_t *)(d); \ 16852873Sru _d->i6[0] = NLADD(_s->i6[0], x); \ 16952873Sru if (ntohl(_d->i6[0]) < ntohl(_s->i6[0])) { \ 17051231Ssheldonh _d->i6[1] = NLADD(_d->i6[1], 1); \ 17151231Ssheldonh if (ntohl(_d->i6[1]) < ntohl(_s->i6[1])) { \ 17215027Sphk _d->i6[2] = NLADD(_d->i6[2], 1); \ 17351231Ssheldonh if (ntohl(_d->i6[2]) < ntohl(_s->i6[2])) { \ 17451231Ssheldonh _d->i6[3] = NLADD(_d->i6[3], 1); \ 17515027Sphk } \ 17651231Ssheldonh } \ 17751231Ssheldonh } \ 17815027Sphk } while (0) 17951231Ssheldonh#define IP6_AND(a,b,d) do { i6addr_t *_s1 = (i6addr_t *)(a); \ 18072772Snsayer i6addr_t *_s2 = (i6addr_t *)(b); \ 18115027Sphk i6addr_t *_d = (i6addr_t *)(d); \ 18251231Ssheldonh _d->i6[0] = _s1->i6[0] & _s2->i6[0]; \ 18372772Snsayer _d->i6[1] = _s1->i6[1] & _s2->i6[1]; \ 18415027Sphk _d->i6[2] = _s1->i6[2] & _s2->i6[2]; \ 18551231Ssheldonh _d->i6[3] = _s1->i6[3] & _s2->i6[3]; \ 18651231Ssheldonh } while (0) 18751231Ssheldonh#define IP6_ANDASSIGN(a,m) \ 18851231Ssheldonh do { i6addr_t *_d = (i6addr_t *)(a); \ 18915027Sphk i6addr_t *_m = (i6addr_t *)(m); \ 19051231Ssheldonh _d->i6[0] &= _m->i6[0]; \ 19151231Ssheldonh _d->i6[1] &= _m->i6[1]; \ 19251231Ssheldonh _d->i6[2] &= _m->i6[2]; \ 193121881Sru _d->i6[3] &= _m->i6[3]; \ 19451231Ssheldonh } while (0) 19551231Ssheldonh#define IP6_MASKEQ(a,m,b) \ 19615027Sphk (((I60(a) & I60(m)) == I60(b)) && \ 19751231Ssheldonh ((I61(a) & I61(m)) == I61(b)) && \ 19851231Ssheldonh ((I62(a) & I62(m)) == I62(b)) && \ 19956736Srgrimes ((I63(a) & I63(m)) == I63(b))) 20056736Srgrimes#define IP6_MASKNEQ(a,m,b) \ 20156736Srgrimes (((I60(a) & I60(m)) != I60(b)) || \ 20217594Sjkh ((I61(a) & I61(m)) != I61(b)) || \ 20351231Ssheldonh ((I62(a) & I62(m)) != I62(b)) || \ 20451231Ssheldonh ((I63(a) & I63(m)) != I63(b))) 20556736Srgrimes#define IP6_MERGE(a,b,c) \ 20656736Srgrimes do { i6addr_t *_d, *_s1, *_s2; \ 20756736Srgrimes _d = (i6addr_t *)(a); \ 20815027Sphk _s1 = (i6addr_t *)(b); \ 20991019Scjc _s2 = (i6addr_t *)(c); \ 21091019Scjc _d->i6[0] |= _s1->i6[0] & ~_s2->i6[0]; \ 21151231Ssheldonh _d->i6[1] |= _s1->i6[1] & ~_s2->i6[1]; \ 21251231Ssheldonh _d->i6[2] |= _s1->i6[2] & ~_s2->i6[2]; \ 21351231Ssheldonh _d->i6[3] |= _s1->i6[3] & ~_s2->i6[3]; \ 21415027Sphk } while (0) 21551231Ssheldonh#define IP6_MASK(a,b,c) \ 21656736Srgrimes do { i6addr_t *_d, *_s1, *_s2; \ 21756736Srgrimes _d = (i6addr_t *)(a); \ 21856736Srgrimes _s1 = (i6addr_t *)(b); \ 21915027Sphk _s2 = (i6addr_t *)(c); \ 22064028Sobrien _d->i6[0] = _s1->i6[0] & ~_s2->i6[0]; \ 22164028Sobrien _d->i6[1] = _s1->i6[1] & ~_s2->i6[1]; \ 22264028Sobrien _d->i6[2] = _s1->i6[2] & ~_s2->i6[2]; \ 22356736Srgrimes _d->i6[3] = _s1->i6[3] & ~_s2->i6[3]; \ 22456736Srgrimes } while (0) 22556736Srgrimes#define IP6_SETONES(a) \ 22656736Srgrimes do { i6addr_t *_d = (i6addr_t *)(a); \ 22756736Srgrimes _d->i6[0] = 0xffffffff; \ 22856736Srgrimes _d->i6[1] = 0xffffffff; \ 22964244Sru _d->i6[2] = 0xffffffff; \ 23064244Sru _d->i6[3] = 0xffffffff; \ 23164244Sru } while (0) 23264244Sru 23364244Srutypedef union ipso_u { 23464244Sru u_short ipso_ripso[2]; 23564244Sru u_32_t ipso_doi; 23664244Sru} ipso_t; 23764244Sru 23864244Srutypedef struct fr_ip { 23964244Sru u_32_t fi_v:4; /* IP version */ 24064244Sru u_32_t fi_xx:4; /* spare */ 24164244Sru u_32_t fi_tos:8; /* IP packet TOS */ 24264244Sru u_32_t fi_ttl:8; /* IP packet TTL */ 24364244Sru u_32_t fi_p:8; /* IP packet protocol */ 24464244Sru u_32_t fi_optmsk; /* bitmask composed from IP options */ 24564244Sru i6addr_t fi_src; /* source address from packet */ 24664244Sru i6addr_t fi_dst; /* destination address from packet */ 24764244Sru ipso_t fi_ipso; /* IP security options */ 24864244Sru u_32_t fi_flx; /* packet flags */ 24964244Sru u_32_t fi_tcpmsk; /* TCP options set/reset */ 25064244Sru u_32_t fi_ports[2]; /* TCP ports */ 25164244Sru u_char fi_tcpf; /* TCP flags */ 25264244Sru u_char fi_sensitivity; 25364244Sru u_char fi_xxx[2]; /* pad */ 25464244Sru} fr_ip_t; 25564244Sru 25664244Sru/* 25764244Sru * For use in fi_flx 25851231Ssheldonh */ 25951231Ssheldonh#define FI_TCPUDP 0x0001 /* TCP/UCP implied comparison*/ 26015027Sphk#define FI_OPTIONS 0x0002 26152873Sru#define FI_FRAG 0x0004 26252873Sru#define FI_SHORT 0x0008 26352873Sru#define FI_NATED 0x0010 26451231Ssheldonh#define FI_MULTICAST 0x0020 26551231Ssheldonh#define FI_BROADCAST 0x0040 26615027Sphk#define FI_MBCAST 0x0080 26751231Ssheldonh#define FI_STATE 0x0100 26851231Ssheldonh#define FI_BADNAT 0x0200 26952404Sru#define FI_BAD 0x0400 27052404Sru#define FI_OOW 0x0800 /* Out of state window, else match */ 27115027Sphk#define FI_ICMPERR 0x1000 27251231Ssheldonh#define FI_FRAGBODY 0x2000 27351231Ssheldonh#define FI_BADSRC 0x4000 27415027Sphk#define FI_LOWTTL 0x8000 27551231Ssheldonh#define FI_CMP 0x5cfe3 /* Not FI_FRAG,FI_NATED,FI_FRAGTAIL */ 27651231Ssheldonh#define FI_ICMPCMP 0x0003 /* Flags we can check for ICMP error packets */ 27715027Sphk#define FI_WITH 0x5effe /* Not FI_TCPUDP */ 27851231Ssheldonh#define FI_V6EXTHDR 0x10000 27951231Ssheldonh#define FI_COALESCE 0x20000 28015027Sphk#define FI_NEWNAT 0x40000 28151231Ssheldonh#define FI_ICMPQUERY 0x80000 28272772Snsayer#define FI_ENCAP 0x100000 /* encap/decap with NAT */ 28315027Sphk#define FI_AH 0x200000 /* AH header present */ 28451231Ssheldonh#define FI_DOCKSUM 0x10000000 /* Proxy wants L4 recalculation */ 28572772Snsayer#define FI_NOCKSUM 0x20000000 /* don't do a L4 checksum validation */ 28615027Sphk#define FI_NOWILD 0x40000000 /* Do not do wildcard searches */ 28751231Ssheldonh#define FI_IGNORE 0x80000000 28851231Ssheldonh 28951231Ssheldonh#define fi_secmsk fi_ipso.ipso_ripso[0] 29051231Ssheldonh#define fi_auth fi_ipso.ipso_ripso[1] 29115027Sphk#define fi_doi fi_ipso.ipso_doi 29291019Scjc#define fi_saddr fi_src.in4.s_addr 29391019Scjc#define fi_daddr fi_dst.in4.s_addr 29491019Scjc#define fi_srcnum fi_src.iplookupnum 29551231Ssheldonh#define fi_dstnum fi_dst.iplookupnum 29651231Ssheldonh#define fi_srcname fi_src.iplookupname 29751231Ssheldonh#define fi_dstname fi_dst.iplookupname 29859669Sbsd#define fi_srctype fi_src.iplookuptype 29957014Spaul#define fi_dsttype fi_dst.iplookuptype 30051231Ssheldonh#define fi_srcsubtype fi_src.iplookupsubtype 30151231Ssheldonh#define fi_dstsubtype fi_dst.iplookupsubtype 30251231Ssheldonh#define fi_srcptr fi_src.iplookupptr 303#define fi_dstptr fi_dst.iplookupptr 304#define fi_srcfunc fi_src.iplookupfunc 305#define fi_dstfunc fi_dst.iplookupfunc 306 307 308/* 309 * These are both used by the state and NAT code to indicate that one port or 310 * the other should be treated as a wildcard. 311 * NOTE: When updating, check bit masks in ip_state.h and update there too. 312 */ 313#define SI_W_SPORT 0x00000100 314#define SI_W_DPORT 0x00000200 315#define SI_WILDP (SI_W_SPORT|SI_W_DPORT) 316#define SI_W_SADDR 0x00000400 317#define SI_W_DADDR 0x00000800 318#define SI_WILDA (SI_W_SADDR|SI_W_DADDR) 319#define SI_NEWFR 0x00001000 320#define SI_CLONE 0x00002000 321#define SI_CLONED 0x00004000 322#define SI_NEWCLONE 0x00008000 323 324typedef struct { 325 u_short fda_ports[2]; 326 u_char fda_tcpf; /* TCP header flags (SYN, ACK, etc) */ 327} frdat_t; 328 329typedef enum fr_breasons_e { 330 FRB_BLOCKED = 0, 331 FRB_LOGFAIL = 1, 332 FRB_PPSRATE = 2, 333 FRB_JUMBO = 3, 334 FRB_MAKEFRIP = 4, 335 FRB_STATEADD = 5, 336 FRB_UPDATEIPID = 6, 337 FRB_LOGFAIL2 = 7, 338 FRB_DECAPFRIP = 8, 339 FRB_AUTHNEW = 9, 340 FRB_AUTHCAPTURE = 10, 341 FRB_COALESCE = 11, 342 FRB_PULLUP = 12, 343 FRB_AUTHFEEDBACK = 13, 344 FRB_BADFRAG = 14, 345 FRB_NATV4 = 15, 346 FRB_NATV6 = 16, 347} fr_breason_t; 348 349#define FRB_MAX_VALUE 16 350 351typedef enum ipf_cksum_e { 352 FI_CK_BAD = -1, 353 FI_CK_NEEDED = 0, 354 FI_CK_SUMOK = 1, 355 FI_CK_L4PART = 2, 356 FI_CK_L4FULL = 4 357} ipf_cksum_t; 358 359typedef struct fr_info { 360 void *fin_main_soft; 361 void *fin_ifp; /* interface packet is `on' */ 362 struct frentry *fin_fr; /* last matching rule */ 363 int fin_out; /* in or out ? 1 == out, 0 == in */ 364 fr_ip_t fin_fi; /* IP Packet summary */ 365 frdat_t fin_dat; /* TCP/UDP ports, ICMP code/type */ 366 int fin_dlen; /* length of data portion of packet */ 367 int fin_plen; 368 u_32_t fin_rule; /* rule # last matched */ 369 u_short fin_hlen; /* length of IP header in bytes */ 370 char fin_group[FR_GROUPLEN]; /* group number, -1 for none */ 371 void *fin_dp; /* start of data past IP header */ 372 /* 373 * Fields after fin_dp aren't used for compression of log records. 374 * fin_fi contains the IP version (fin_family) 375 * fin_rule isn't included because adding a new rule can change it but 376 * not change fin_fr. fin_rule is the rule number reported. 377 * It isn't necessary to include fin_crc because that is checked 378 * for explicitly, before calling bcmp. 379 */ 380 u_32_t fin_crc; /* Simple calculation for logging */ 381 int fin_family; /* AF_INET, etc. */ 382 int fin_icode; /* ICMP error to return */ 383 int fin_mtu; /* MTU input for ICMP need-frag */ 384 int fin_rev; /* state only: 1 = reverse */ 385 int fin_ipoff; /* # bytes from buffer start to hdr */ 386 u_32_t fin_id; /* IP packet id field */ 387 u_short fin_l4hlen; /* length of L4 header, if known */ 388 u_short fin_off; 389 int fin_depth; /* Group nesting depth */ 390 int fin_error; /* Error code to return */ 391 ipf_cksum_t fin_cksum; /* -1 = bad, 1 = good, 0 = not done */ 392 fr_breason_t fin_reason; /* why auto blocked */ 393 u_int fin_pktnum; 394 void *fin_nattag; 395 struct frdest *fin_dif; 396 struct frdest *fin_tif; 397 union { 398 ip_t *fip_ip; 399#ifdef USE_INET6 400 ip6_t *fip_ip6; 401#endif 402 } fin_ipu; 403 mb_t **fin_mp; /* pointer to pointer to mbuf */ 404 mb_t *fin_m; /* pointer to mbuf */ 405#ifdef MENTAT 406 mb_t *fin_qfm; /* pointer to mblk where pkt starts */ 407 void *fin_qpi; 408 char fin_ifname[LIFNAMSIZ]; 409#endif 410 void *fin_fraghdr; /* pointer to start of ipv6 frag hdr */ 411} fr_info_t; 412 413#define fin_ip fin_ipu.fip_ip 414#define fin_ip6 fin_ipu.fip_ip6 415#define fin_v fin_fi.fi_v 416#define fin_p fin_fi.fi_p 417#define fin_flx fin_fi.fi_flx 418#define fin_optmsk fin_fi.fi_optmsk 419#define fin_secmsk fin_fi.fi_secmsk 420#define fin_doi fin_fi.fi_doi 421#define fin_auth fin_fi.fi_auth 422#define fin_src fin_fi.fi_src.in4 423#define fin_saddr fin_fi.fi_saddr 424#define fin_dst fin_fi.fi_dst.in4 425#define fin_daddr fin_fi.fi_daddr 426#define fin_data fin_fi.fi_ports 427#define fin_sport fin_fi.fi_ports[0] 428#define fin_dport fin_fi.fi_ports[1] 429#define fin_tcpf fin_fi.fi_tcpf 430#define fin_src6 fin_fi.fi_src 431#define fin_dst6 fin_fi.fi_dst 432#define fin_srcip6 fin_fi.fi_src.in6 433#define fin_dstip6 fin_fi.fi_dst.in6 434 435#define IPF_IN 0 436#define IPF_OUT 1 437 438typedef struct frentry *(*ipfunc_t)(fr_info_t *, u_32_t *); 439typedef int (*ipfuncinit_t)(struct ipf_main_softc_s *, struct frentry *); 440 441typedef struct ipfunc_resolve { 442 char ipfu_name[32]; 443 ipfunc_t ipfu_addr; 444 ipfuncinit_t ipfu_init; 445 ipfuncinit_t ipfu_fini; 446} ipfunc_resolve_t; 447 448/* 449 * Size for compares on fr_info structures 450 */ 451#define FI_CSIZE offsetof(fr_info_t, fin_icode) 452#define FI_LCSIZE offsetof(fr_info_t, fin_dp) 453 454/* 455 * Size for copying cache fr_info structure 456 */ 457#define FI_COPYSIZE offsetof(fr_info_t, fin_dp) 458 459/* 460 * Structure for holding IPFilter's tag information 461 */ 462#define IPFTAG_LEN 16 463typedef struct { 464 union { 465 u_32_t iptu_num[4]; 466 char iptu_tag[IPFTAG_LEN]; 467 } ipt_un; 468 int ipt_not; 469} ipftag_t; 470 471#define ipt_tag ipt_un.iptu_tag 472#define ipt_num ipt_un.iptu_num 473 474/* 475 * Structure to define address for pool lookups. 476 */ 477typedef struct { 478 u_char adf_len; 479 sa_family_t adf_family; 480 u_char adf_xxx[2]; 481 i6addr_t adf_addr; 482} addrfamily_t; 483 484 485RBI_LINK(ipf_rb, host_node_s); 486 487typedef struct host_node_s { 488 RBI_FIELD(ipf_rb) hn_entry; 489 addrfamily_t hn_addr; 490 int hn_active; 491} host_node_t; 492 493typedef RBI_HEAD(ipf_rb, host_node_s) ipf_rb_head_t; 494 495typedef struct host_track_s { 496 ipf_rb_head_t ht_root; 497 int ht_max_nodes; 498 int ht_max_per_node; 499 int ht_netmask; 500 int ht_cur_nodes; 501} host_track_t; 502 503 504typedef enum fr_dtypes_e { 505 FRD_NORMAL = 0, 506 FRD_DSTLIST 507} fr_dtypes_t; 508/* 509 * This structure is used to hold information about the next hop for where 510 * to forward a packet. 511 */ 512typedef struct frdest { 513 void *fd_ptr; 514 addrfamily_t fd_addr; 515 fr_dtypes_t fd_type; 516 int fd_name; 517} frdest_t; 518 519#define fd_ip6 fd_addr.adf_addr 520#define fd_ip fd_ip6.in4 521 522 523typedef enum fr_ctypes_e { 524 FR_NONE = 0, 525 FR_EQUAL, 526 FR_NEQUAL, 527 FR_LESST, 528 FR_GREATERT, 529 FR_LESSTE, 530 FR_GREATERTE, 531 FR_OUTRANGE, 532 FR_INRANGE, 533 FR_INCRANGE 534} fr_ctypes_t; 535 536/* 537 * This structure holds information about a port comparison. 538 */ 539typedef struct frpcmp { 540 fr_ctypes_t frp_cmp; /* data for port comparisons */ 541 u_32_t frp_port; /* low port for <> and >< */ 542 u_32_t frp_top; /* high port for <> and >< */ 543} frpcmp_t; 544 545 546/* 547 * Structure containing all the relevant TCP/UDP things that can be checked in 548 * a filter rule. 549 */ 550typedef struct frtuc { 551 u_char ftu_tcpfm; /* tcp flags mask */ 552 u_char ftu_tcpf; /* tcp flags */ 553 frpcmp_t ftu_src; /* source port */ 554 frpcmp_t ftu_dst; /* destination port */ 555} frtuc_t; 556 557#define ftu_scmp ftu_src.frp_cmp 558#define ftu_dcmp ftu_dst.frp_cmp 559#define ftu_sport ftu_src.frp_port 560#define ftu_dport ftu_dst.frp_port 561#define ftu_stop ftu_src.frp_top 562#define ftu_dtop ftu_dst.frp_top 563 564#define FR_TCPFMAX 0x3f 565 566typedef enum fr_atypes_e { 567 FRI_NONE = -1, /* For LHS of NAT */ 568 FRI_NORMAL = 0, /* Normal address */ 569 FRI_DYNAMIC, /* dynamic address */ 570 FRI_LOOKUP, /* address is a pool # */ 571 FRI_RANGE, /* address/mask is a range */ 572 FRI_NETWORK, /* network address from if */ 573 FRI_BROADCAST, /* broadcast address from if */ 574 FRI_PEERADDR, /* Peer address for P-to-P */ 575 FRI_NETMASKED, /* network address with netmask from if */ 576 FRI_SPLIT, /* For NAT compatibility */ 577 FRI_INTERFACE /* address is based on interface name */ 578} fr_atypes_t; 579 580/* 581 * This structure makes up what is considered to be the IPFilter specific 582 * matching components of a filter rule, as opposed to the data structures 583 * used to define the result which are in frentry_t and not here. 584 */ 585typedef struct fripf { 586 fr_ip_t fri_ip; 587 fr_ip_t fri_mip; /* mask structure */ 588 589 u_short fri_icmpm; /* data for ICMP packets (mask) */ 590 u_short fri_icmp; 591 592 frtuc_t fri_tuc; 593 fr_atypes_t fri_satype; /* addres type */ 594 fr_atypes_t fri_datype; /* addres type */ 595 int fri_sifpidx; /* doing dynamic addressing */ 596 int fri_difpidx; /* index into fr_ifps[] to use when */ 597} fripf_t; 598 599#define fri_dlookup fri_mip.fi_dst 600#define fri_slookup fri_mip.fi_src 601#define fri_dstnum fri_mip.fi_dstnum 602#define fri_srcnum fri_mip.fi_srcnum 603#define fri_dstname fri_mip.fi_dstname 604#define fri_srcname fri_mip.fi_srcname 605#define fri_dstptr fri_mip.fi_dstptr 606#define fri_srcptr fri_mip.fi_srcptr 607 608 609typedef enum fr_rtypes_e { 610 FR_T_NONE = 0, 611 FR_T_IPF, /* IPF structures */ 612 FR_T_BPFOPC, /* BPF opcode */ 613 FR_T_CALLFUNC, /* callout to function in fr_func only */ 614 FR_T_COMPIPF, /* compiled C code */ 615 FR_T_IPFEXPR, /* IPF expression */ 616 FR_T_BUILTIN = 0x40000000, /* rule is in kernel space */ 617 FR_T_IPF_BUILTIN, 618 FR_T_BPFOPC_BUILTIN, 619 FR_T_CALLFUNC_BUILTIN, 620 FR_T_COMPIPF_BUILTIN, 621 FR_T_IPFEXPR_BUILTIN 622} fr_rtypes_t; 623 624typedef struct frentry * (* frentfunc_t)(fr_info_t *); 625 626typedef struct frentry { 627 ipfmutex_t fr_lock; 628 struct frentry *fr_next; 629 struct frentry **fr_pnext; 630 struct frgroup *fr_grp; 631 struct frgroup *fr_grphead; 632 struct frgroup *fr_icmpgrp; 633 struct ipscan *fr_isc; 634 struct frentry *fr_dnext; /* 2 fr_die linked list pointers */ 635 struct frentry **fr_pdnext; 636 void *fr_ifas[4]; 637 void *fr_ptr; /* for use with fr_arg */ 638 int fr_comment; /* text comment for rule */ 639 int fr_size; /* size of this structure */ 640 int fr_ref; /* reference count */ 641 int fr_statecnt; /* state count - for limit rules */ 642 u_32_t fr_die; /* only used on loading the rule */ 643 u_int fr_cksum; /* checksum on filter rules for performance */ 644 /* 645 * The line number from a file is here because we need to be able to 646 * match the rule generated with ``grep rule ipf.conf | ipf -rf -'' 647 * with the rule loaded using ``ipf -f ipf.conf'' - thus it can't be 648 * on the other side of fr_func. 649 */ 650 int fr_flineno; /* line number from conf file */ 651 /* 652 * These are only incremented when a packet matches this rule and 653 * it is the last match 654 */ 655 U_QUAD_T fr_hits; 656 U_QUAD_T fr_bytes; 657 658 /* 659 * For PPS rate limiting 660 * fr_lpu is used to always have the same size for this field, 661 * allocating 64bits for seconds and 32bits for milliseconds. 662 */ 663 union { 664 struct timeval frp_lastpkt; 665 char frp_bytes[12]; 666 } fr_lpu; 667 int fr_curpps; 668 669 union { 670 void *fru_data; 671 char *fru_caddr; 672 fripf_t *fru_ipf; 673 frentfunc_t fru_func; 674 } fr_dun; 675 676 /* 677 * Fields after this may not change whilst in the kernel. 678 */ 679 ipfunc_t fr_func; /* call this function */ 680 int fr_dsize; 681 int fr_pps; 682 fr_rtypes_t fr_type; 683 u_32_t fr_flags; /* per-rule flags && options (see below) */ 684 u_32_t fr_logtag; /* user defined log tag # */ 685 u_32_t fr_collect; /* collection number */ 686 u_int fr_arg; /* misc. numeric arg for rule */ 687 u_int fr_loglevel; /* syslog log facility + priority */ 688 u_char fr_family; 689 u_char fr_icode; /* return ICMP code */ 690 int fr_group; /* group to which this rule belongs */ 691 int fr_grhead; /* group # which this rule starts */ 692 int fr_isctag; 693 int fr_rpc; /* XID Filtering */ 694 ipftag_t fr_nattag; 695 /* 696 * These are all options related to stateful filtering 697 */ 698 host_track_t fr_srctrack; 699 int fr_nostatelog; 700 int fr_statemax; /* max reference count */ 701 int fr_icmphead; /* ICMP group for state options */ 702 u_int fr_age[2]; /* non-TCP state timeouts */ 703 /* 704 * These are compared separately. 705 */ 706 int fr_ifnames[4]; 707 frdest_t fr_tifs[2]; /* "to"/"reply-to" interface */ 708 frdest_t fr_dif; /* duplicate packet interface */ 709 /* 710 * How big is the name buffer at the end? 711 */ 712 int fr_namelen; 713 char fr_names[1]; 714} frentry_t; 715 716#define fr_lastpkt fr_lpu.frp_lastpkt 717#define fr_caddr fr_dun.fru_caddr 718#define fr_data fr_dun.fru_data 719#define fr_dfunc fr_dun.fru_func 720#define fr_ipf fr_dun.fru_ipf 721#define fr_ip fr_ipf->fri_ip 722#define fr_mip fr_ipf->fri_mip 723#define fr_icmpm fr_ipf->fri_icmpm 724#define fr_icmp fr_ipf->fri_icmp 725#define fr_tuc fr_ipf->fri_tuc 726#define fr_satype fr_ipf->fri_satype 727#define fr_datype fr_ipf->fri_datype 728#define fr_sifpidx fr_ipf->fri_sifpidx 729#define fr_difpidx fr_ipf->fri_difpidx 730#define fr_proto fr_ip.fi_p 731#define fr_mproto fr_mip.fi_p 732#define fr_ttl fr_ip.fi_ttl 733#define fr_mttl fr_mip.fi_ttl 734#define fr_tos fr_ip.fi_tos 735#define fr_mtos fr_mip.fi_tos 736#define fr_tcpfm fr_tuc.ftu_tcpfm 737#define fr_tcpf fr_tuc.ftu_tcpf 738#define fr_scmp fr_tuc.ftu_scmp 739#define fr_dcmp fr_tuc.ftu_dcmp 740#define fr_dport fr_tuc.ftu_dport 741#define fr_sport fr_tuc.ftu_sport 742#define fr_stop fr_tuc.ftu_stop 743#define fr_dtop fr_tuc.ftu_dtop 744#define fr_dst fr_ip.fi_dst.in4 745#define fr_dst6 fr_ip.fi_dst 746#define fr_daddr fr_ip.fi_dst.in4.s_addr 747#define fr_src fr_ip.fi_src.in4 748#define fr_src6 fr_ip.fi_src 749#define fr_saddr fr_ip.fi_src.in4.s_addr 750#define fr_dmsk fr_mip.fi_dst.in4 751#define fr_dmsk6 fr_mip.fi_dst 752#define fr_dmask fr_mip.fi_dst.in4.s_addr 753#define fr_smsk fr_mip.fi_src.in4 754#define fr_smsk6 fr_mip.fi_src 755#define fr_smask fr_mip.fi_src.in4.s_addr 756#define fr_dstnum fr_ip.fi_dstnum 757#define fr_srcnum fr_ip.fi_srcnum 758#define fr_dlookup fr_ip.fi_dst 759#define fr_slookup fr_ip.fi_src 760#define fr_dstname fr_ip.fi_dstname 761#define fr_srcname fr_ip.fi_srcname 762#define fr_dsttype fr_ip.fi_dsttype 763#define fr_srctype fr_ip.fi_srctype 764#define fr_dstsubtype fr_ip.fi_dstsubtype 765#define fr_srcsubtype fr_ip.fi_srcsubtype 766#define fr_dstptr fr_mip.fi_dstptr 767#define fr_srcptr fr_mip.fi_srcptr 768#define fr_dstfunc fr_mip.fi_dstfunc 769#define fr_srcfunc fr_mip.fi_srcfunc 770#define fr_optbits fr_ip.fi_optmsk 771#define fr_optmask fr_mip.fi_optmsk 772#define fr_secbits fr_ip.fi_secmsk 773#define fr_secmask fr_mip.fi_secmsk 774#define fr_authbits fr_ip.fi_auth 775#define fr_authmask fr_mip.fi_auth 776#define fr_doi fr_ip.fi_doi 777#define fr_doimask fr_mip.fi_doi 778#define fr_flx fr_ip.fi_flx 779#define fr_mflx fr_mip.fi_flx 780#define fr_ifa fr_ifas[0] 781#define fr_oifa fr_ifas[2] 782#define fr_tif fr_tifs[0] 783#define fr_rif fr_tifs[1] 784 785#define FR_NOLOGTAG 0 786 787#define FR_CMPSIZ (offsetof(struct frentry, fr_ifnames) - \ 788 offsetof(struct frentry, fr_func)) 789#define FR_NAME(_f, _n) (_f)->fr_names + (_f)->_n 790#define FR_NUM(_a) (sizeof(_a) / sizeof(*_a)) 791 792 793/* 794 * fr_flags 795 */ 796#define FR_BLOCK 0x00001 /* do not allow packet to pass */ 797#define FR_PASS 0x00002 /* allow packet to pass */ 798#define FR_AUTH 0x00003 /* use authentication */ 799#define FR_PREAUTH 0x00004 /* require preauthentication */ 800#define FR_ACCOUNT 0x00005 /* Accounting rule */ 801#define FR_SKIP 0x00006 /* skip rule */ 802#define FR_DECAPSULATE 0x00008 /* decapsulate rule */ 803#define FR_CALL 0x00009 /* call rule */ 804#define FR_CMDMASK 0x0000f 805#define FR_LOG 0x00010 /* Log */ 806#define FR_LOGB 0x00011 /* Log-fail */ 807#define FR_LOGP 0x00012 /* Log-pass */ 808#define FR_LOGMASK (FR_LOG|FR_CMDMASK) 809#define FR_CALLNOW 0x00020 /* call another function (fr_func) if matches */ 810#define FR_NOTSRCIP 0x00040 811#define FR_NOTDSTIP 0x00080 812#define FR_QUICK 0x00100 /* match & stop processing list */ 813#define FR_KEEPFRAG 0x00200 /* keep fragment information */ 814#define FR_KEEPSTATE 0x00400 /* keep `connection' state information */ 815#define FR_FASTROUTE 0x00800 /* bypass normal routing */ 816#define FR_RETRST 0x01000 /* Return TCP RST packet - reset connection */ 817#define FR_RETICMP 0x02000 /* Return ICMP unreachable packet */ 818#define FR_FAKEICMP 0x03000 /* Return ICMP unreachable with fake source */ 819#define FR_OUTQUE 0x04000 /* outgoing packets */ 820#define FR_INQUE 0x08000 /* ingoing packets */ 821#define FR_LOGBODY 0x10000 /* Log the body */ 822#define FR_LOGFIRST 0x20000 /* Log the first byte if state held */ 823#define FR_LOGORBLOCK 0x40000 /* block the packet if it can't be logged */ 824#define FR_STLOOSE 0x80000 /* loose state checking */ 825#define FR_FRSTRICT 0x100000 /* strict frag. cache */ 826#define FR_STSTRICT 0x200000 /* strict keep state */ 827#define FR_NEWISN 0x400000 /* new ISN for outgoing TCP */ 828#define FR_NOICMPERR 0x800000 /* do not match ICMP errors in state */ 829#define FR_STATESYNC 0x1000000 /* synchronize state to slave */ 830#define FR_COPIED 0x2000000 /* copied from user space */ 831#define FR_INACTIVE 0x4000000 /* only used when flush'ing rules */ 832#define FR_NOMATCH 0x8000000 /* no match occured */ 833 /* 0x10000000 FF_LOGPASS */ 834 /* 0x20000000 FF_LOGBLOCK */ 835 /* 0x40000000 FF_LOGNOMATCH */ 836 /* 0x80000000 FF_BLOCKNONIP */ 837 838#define FR_RETMASK (FR_RETICMP|FR_RETRST|FR_FAKEICMP) 839#define FR_ISBLOCK(x) (((x) & FR_CMDMASK) == FR_BLOCK) 840#define FR_ISPASS(x) (((x) & FR_CMDMASK) == FR_PASS) 841#define FR_ISAUTH(x) (((x) & FR_CMDMASK) == FR_AUTH) 842#define FR_ISPREAUTH(x) (((x) & FR_CMDMASK) == FR_PREAUTH) 843#define FR_ISACCOUNT(x) (((x) & FR_CMDMASK) == FR_ACCOUNT) 844#define FR_ISSKIP(x) (((x) & FR_CMDMASK) == FR_SKIP) 845#define FR_ISDECAPS(x) (((x) & FR_CMDMASK) == FR_DECAPSULATE) 846#define FR_ISNOMATCH(x) ((x) & FR_NOMATCH) 847#define FR_INOUT (FR_INQUE|FR_OUTQUE) 848 849/* 850 * recognized flags for SIOCGETFF and SIOCSETFF, and get put in fr_flags 851 */ 852#define FF_LOGPASS 0x10000000 853#define FF_LOGBLOCK 0x20000000 854#define FF_LOGNOMATCH 0x40000000 855#define FF_LOGGING (FF_LOGPASS|FF_LOGBLOCK|FF_LOGNOMATCH) 856#define FF_BLOCKNONIP 0x80000000 /* Solaris2 Only */ 857 858 859/* 860 * Structure that passes information on what/how to flush to the kernel. 861 */ 862typedef struct ipfflush { 863 int ipflu_how; 864 int ipflu_arg; 865} ipfflush_t; 866 867 868/* 869 * 870 */ 871typedef struct ipfgetctl { 872 u_int ipfg_min; /* min value */ 873 u_int ipfg_current; /* current value */ 874 u_int ipfg_max; /* max value */ 875 u_int ipfg_default; /* default value */ 876 u_int ipfg_steps; /* value increments */ 877 char ipfg_name[40]; /* tag name for this control */ 878} ipfgetctl_t; 879 880typedef struct ipfsetctl { 881 int ipfs_which; /* 0 = min 1 = current 2 = max 3 = default */ 882 u_int ipfs_value; /* min value */ 883 char ipfs_name[40]; /* tag name for this control */ 884} ipfsetctl_t; 885 886 887/* 888 * Some of the statistics below are in their own counters, but most are kept 889 * in this single structure so that they can all easily be collected and 890 * copied back as required. 891 */ 892typedef struct ipf_statistics { 893 u_long fr_icmp_coalesce; 894 u_long fr_tcp_frag; 895 u_long fr_tcp_pullup; 896 u_long fr_tcp_short; 897 u_long fr_tcp_small; 898 u_long fr_tcp_bad_flags; 899 u_long fr_udp_pullup; 900 u_long fr_ip_freed; 901 u_long fr_v6_ah_bad; 902 u_long fr_v6_bad; 903 u_long fr_v6_badfrag; 904 u_long fr_v6_dst_bad; 905 u_long fr_v6_esp_pullup; 906 u_long fr_v6_ext_short; 907 u_long fr_v6_ext_pullup; 908 u_long fr_v6_ext_hlen; 909 u_long fr_v6_frag_bad; 910 u_long fr_v6_frag_pullup; 911 u_long fr_v6_frag_size; 912 u_long fr_v6_gre_pullup; 913 u_long fr_v6_icmp6_pullup; 914 u_long fr_v6_rh_bad; 915 u_long fr_v6_badttl; /* TTL in packet doesn't reach minimum */ 916 u_long fr_v4_ah_bad; 917 u_long fr_v4_ah_pullup; 918 u_long fr_v4_esp_pullup; 919 u_long fr_v4_cipso_bad; 920 u_long fr_v4_cipso_tlen; 921 u_long fr_v4_gre_frag; 922 u_long fr_v4_gre_pullup; 923 u_long fr_v4_icmp_frag; 924 u_long fr_v4_icmp_pullup; 925 u_long fr_v4_badttl; /* TTL in packet doesn't reach minimum */ 926 u_long fr_v4_badsrc; /* source received doesn't match route */ 927 u_long fr_l4_badcksum; /* layer 4 header checksum failure */ 928 u_long fr_badcoalesces; 929 u_long fr_pass; /* packets allowed */ 930 u_long fr_block; /* packets denied */ 931 u_long fr_nom; /* packets which don't match any rule */ 932 u_long fr_short; /* packets which are short */ 933 u_long fr_ppkl; /* packets allowed and logged */ 934 u_long fr_bpkl; /* packets denied and logged */ 935 u_long fr_npkl; /* packets unmatched and logged */ 936 u_long fr_ret; /* packets for which a return is sent */ 937 u_long fr_acct; /* packets for which counting was performed */ 938 u_long fr_bnfr; /* bad attempts to allocate fragment state */ 939 u_long fr_nfr; /* new fragment state kept */ 940 u_long fr_cfr; /* add new fragment state but complete pkt */ 941 u_long fr_bads; /* bad attempts to allocate packet state */ 942 u_long fr_ads; /* new packet state kept */ 943 u_long fr_chit; /* cached hit */ 944 u_long fr_cmiss; /* cached miss */ 945 u_long fr_tcpbad; /* TCP checksum check failures */ 946 u_long fr_pull[2]; /* good and bad pullup attempts */ 947 u_long fr_bad; /* bad IP packets to the filter */ 948 u_long fr_ipv6; /* IPv6 packets in/out */ 949 u_long fr_ppshit; /* dropped because of pps ceiling */ 950 u_long fr_ipud; /* IP id update failures */ 951 u_long fr_blocked[FRB_MAX_VALUE + 1]; 952} ipf_statistics_t; 953 954/* 955 * Log structure. Each packet header logged is prepended by one of these. 956 * Following this in the log records read from the device will be an ipflog 957 * structure which is then followed by any packet data. 958 */ 959typedef struct iplog { 960 u_32_t ipl_magic; 961 u_int ipl_count; 962 u_32_t ipl_seqnum; 963 struct timeval ipl_time; 964 size_t ipl_dsize; 965 struct iplog *ipl_next; 966} iplog_t; 967 968#define ipl_sec ipl_time.tv_sec 969#define ipl_usec ipl_time.tv_usec 970 971#define IPL_MAGIC 0x49504c4d /* 'IPLM' */ 972#define IPL_MAGIC_NAT 0x49504c4e /* 'IPLN' */ 973#define IPL_MAGIC_STATE 0x49504c53 /* 'IPLS' */ 974#define IPLOG_SIZE sizeof(iplog_t) 975 976typedef struct ipflog { 977 u_int fl_unit; 978 u_32_t fl_rule; 979 u_32_t fl_flags; 980 u_32_t fl_lflags; 981 u_32_t fl_logtag; 982 ipftag_t fl_nattag; 983 u_short fl_plen; /* extra data after hlen */ 984 u_short fl_loglevel; /* syslog log level */ 985 char fl_group[FR_GROUPLEN]; 986 u_char fl_hlen; /* length of IP headers saved */ 987 u_char fl_dir; 988 u_char fl_breason; /* from fin_reason */ 989 u_char fl_family; /* address family of packet logged */ 990 char fl_ifname[LIFNAMSIZ]; 991} ipflog_t; 992 993#ifndef IPF_LOGGING 994# define IPF_LOGGING 0 995#endif 996#ifndef IPF_DEFAULT_PASS 997# define IPF_DEFAULT_PASS FR_PASS 998#endif 999 1000#define DEFAULT_IPFLOGSIZE 32768 1001#ifndef IPFILTER_LOGSIZE 1002# define IPFILTER_LOGSIZE DEFAULT_IPFLOGSIZE 1003#else 1004# if IPFILTER_LOGSIZE < 8192 1005# error IPFILTER_LOGSIZE too small. Must be >= 8192 1006# endif 1007#endif 1008 1009#define IPF_OPTCOPY 0x07ff00 /* bit mask of copied options */ 1010 1011/* 1012 * Device filenames for reading log information. Use ipf on Solaris2 because 1013 * ipl is already a name used by something else. 1014 */ 1015#ifndef IPL_NAME 1016# if SOLARIS 1017# define IPL_NAME "/dev/ipf" 1018# else 1019# define IPL_NAME "/dev/ipl" 1020# endif 1021#endif 1022/* 1023 * Pathnames for various IP Filter control devices. Used by LKM 1024 * and userland, so defined here. 1025 */ 1026#define IPNAT_NAME "/dev/ipnat" 1027#define IPSTATE_NAME "/dev/ipstate" 1028#define IPAUTH_NAME "/dev/ipauth" 1029#define IPSYNC_NAME "/dev/ipsync" 1030#define IPSCAN_NAME "/dev/ipscan" 1031#define IPLOOKUP_NAME "/dev/iplookup" 1032 1033#define IPL_LOGIPF 0 /* Minor device #'s for accessing logs */ 1034#define IPL_LOGNAT 1 1035#define IPL_LOGSTATE 2 1036#define IPL_LOGAUTH 3 1037#define IPL_LOGSYNC 4 1038#define IPL_LOGSCAN 5 1039#define IPL_LOGLOOKUP 6 1040#define IPL_LOGCOUNT 7 1041#define IPL_LOGMAX 7 1042#define IPL_LOGSIZE IPL_LOGMAX + 1 1043#define IPL_LOGALL -1 1044#define IPL_LOGNONE -2 1045 1046/* 1047 * For SIOCGETFS 1048 */ 1049typedef struct friostat { 1050 ipf_statistics_t f_st[2]; 1051 frentry_t *f_ipf[2][2]; 1052 frentry_t *f_acct[2][2]; 1053 frentry_t *f_auth; 1054 struct frgroup *f_groups[IPL_LOGSIZE][2]; 1055 u_long f_froute[2]; 1056 u_long f_log_ok; 1057 u_long f_log_fail; 1058 u_long f_rb_no_mem; 1059 u_long f_rb_node_max; 1060 u_32_t f_ticks; 1061 int f_locks[IPL_LOGSIZE]; 1062 int f_defpass; /* default pass - from fr_pass */ 1063 int f_active; /* 1 or 0 - active rule set */ 1064 int f_running; /* 1 if running, else 0 */ 1065 int f_logging; /* 1 if enabled, else 0 */ 1066 int f_features; 1067 char f_version[32]; /* version string */ 1068} friostat_t; 1069 1070#define f_fin f_ipf[0] 1071#define f_fout f_ipf[1] 1072#define f_acctin f_acct[0] 1073#define f_acctout f_acct[1] 1074 1075#define IPF_FEAT_LKM 0x001 1076#define IPF_FEAT_LOG 0x002 1077#define IPF_FEAT_LOOKUP 0x004 1078#define IPF_FEAT_BPF 0x008 1079#define IPF_FEAT_COMPILED 0x010 1080#define IPF_FEAT_CKSUM 0x020 1081#define IPF_FEAT_SYNC 0x040 1082#define IPF_FEAT_SCAN 0x080 1083#define IPF_FEAT_IPV6 0x100 1084 1085typedef struct optlist { 1086 u_short ol_val; 1087 int ol_bit; 1088} optlist_t; 1089 1090 1091/* 1092 * Group list structure. 1093 */ 1094typedef struct frgroup { 1095 struct frgroup *fg_next; 1096 struct frentry *fg_head; 1097 struct frentry *fg_start; 1098 struct frgroup **fg_set; 1099 u_32_t fg_flags; 1100 int fg_ref; 1101 char fg_name[FR_GROUPLEN]; 1102} frgroup_t; 1103 1104#define FG_NAME(g) (*(g)->fg_name == '\0' ? "" : (g)->fg_name) 1105 1106 1107/* 1108 * Used by state and NAT tables 1109 */ 1110typedef struct icmpinfo { 1111 u_short ici_id; 1112 u_short ici_seq; 1113 u_char ici_type; 1114} icmpinfo_t; 1115 1116typedef struct udpinfo { 1117 u_short us_sport; 1118 u_short us_dport; 1119} udpinfo_t; 1120 1121 1122typedef struct tcpdata { 1123 u_32_t td_end; 1124 u_32_t td_maxend; 1125 u_32_t td_maxwin; 1126 u_32_t td_winscale; 1127 u_32_t td_maxseg; 1128 int td_winflags; 1129} tcpdata_t; 1130 1131#define TCP_WSCALE_MAX 14 1132 1133#define TCP_WSCALE_SEEN 0x00000001 1134#define TCP_WSCALE_FIRST 0x00000002 1135#define TCP_SACK_PERMIT 0x00000004 1136 1137 1138typedef struct tcpinfo { 1139 u_32_t ts_sport; 1140 u_32_t ts_dport; 1141 tcpdata_t ts_data[2]; 1142} tcpinfo_t; 1143 1144 1145/* 1146 * Structures to define a GRE header as seen in a packet. 1147 */ 1148struct grebits { 1149#if defined(sparc) 1150 u_32_t grb_ver:3; 1151 u_32_t grb_flags:3; 1152 u_32_t grb_A:1; 1153 u_32_t grb_recur:1; 1154 u_32_t grb_s:1; 1155 u_32_t grb_S:1; 1156 u_32_t grb_K:1; 1157 u_32_t grb_R:1; 1158 u_32_t grb_C:1; 1159#else 1160 u_32_t grb_C:1; 1161 u_32_t grb_R:1; 1162 u_32_t grb_K:1; 1163 u_32_t grb_S:1; 1164 u_32_t grb_s:1; 1165 u_32_t grb_recur:1; 1166 u_32_t grb_A:1; 1167 u_32_t grb_flags:3; 1168 u_32_t grb_ver:3; 1169#endif 1170 u_short grb_ptype; 1171}; 1172 1173typedef struct grehdr { 1174 union { 1175 struct grebits gru_bits; 1176 u_short gru_flags; 1177 } gr_un; 1178 u_short gr_len; 1179 u_short gr_call; 1180} grehdr_t; 1181 1182#define gr_flags gr_un.gru_flags 1183#define gr_bits gr_un.gru_bits 1184#define gr_ptype gr_bits.grb_ptype 1185#define gr_C gr_bits.grb_C 1186#define gr_R gr_bits.grb_R 1187#define gr_K gr_bits.grb_K 1188#define gr_S gr_bits.grb_S 1189#define gr_s gr_bits.grb_s 1190#define gr_recur gr_bits.grb_recur 1191#define gr_A gr_bits.grb_A 1192#define gr_ver gr_bits.grb_ver 1193 1194/* 1195 * GRE information tracked by "keep state" 1196 */ 1197typedef struct greinfo { 1198 u_short gs_call[2]; 1199 u_short gs_flags; 1200 u_short gs_ptype; 1201} greinfo_t; 1202 1203#define GRE_REV(x) ((ntohs(x) >> 13) & 7) 1204 1205 1206/* 1207 * Format of an Authentication header 1208 */ 1209typedef struct authhdr { 1210 u_char ah_next; 1211 u_char ah_plen; 1212 u_short ah_reserved; 1213 u_32_t ah_spi; 1214 u_32_t ah_seq; 1215 /* Following the sequence number field is 0 or more bytes of */ 1216 /* authentication data, as specified by ah_plen - RFC 2402. */ 1217} authhdr_t; 1218 1219 1220/* 1221 * Timeout tail queue list member 1222 */ 1223typedef struct ipftqent { 1224 struct ipftqent **tqe_pnext; 1225 struct ipftqent *tqe_next; 1226 struct ipftq *tqe_ifq; 1227 void *tqe_parent; /* pointer back to NAT/state struct */ 1228 u_32_t tqe_die; /* when this entriy is to die */ 1229 u_32_t tqe_touched; 1230 int tqe_flags; 1231 int tqe_state[2]; /* current state of this entry */ 1232} ipftqent_t; 1233 1234#define TQE_RULEBASED 0x00000001 1235#define TQE_DELETE 0x00000002 1236 1237 1238/* 1239 * Timeout tail queue head for IPFilter 1240 */ 1241typedef struct ipftq { 1242 ipfmutex_t ifq_lock; 1243 u_int ifq_ttl; 1244 ipftqent_t *ifq_head; 1245 ipftqent_t **ifq_tail; 1246 struct ipftq *ifq_next; 1247 struct ipftq **ifq_pnext; 1248 int ifq_ref; 1249 u_int ifq_flags; 1250} ipftq_t; 1251 1252#define IFQF_USER 0x01 /* User defined aging */ 1253#define IFQF_DELETE 0x02 /* Marked for deletion */ 1254#define IFQF_PROXY 0x04 /* Timeout queue in use by a proxy */ 1255 1256#define IPFTQ_INIT(x,y,z) do { \ 1257 (x)->ifq_ttl = (y); \ 1258 (x)->ifq_head = NULL; \ 1259 (x)->ifq_ref = 1; \ 1260 (x)->ifq_tail = &(x)->ifq_head; \ 1261 MUTEX_INIT(&(x)->ifq_lock, (z)); \ 1262 } while (0) 1263 1264#define IPF_HZ_MULT 1 1265#define IPF_HZ_DIVIDE 2 /* How many times a second ipfilter */ 1266 /* checks its timeout queues. */ 1267#define IPF_TTLVAL(x) (((x) / IPF_HZ_MULT) * IPF_HZ_DIVIDE) 1268 1269typedef int (*ipftq_delete_fn_t)(struct ipf_main_softc_s *, void *); 1270 1271 1272/* 1273 * Object structure description. For passing through in ioctls. 1274 */ 1275typedef struct ipfobj { 1276 u_32_t ipfo_rev; /* IPFilter version number */ 1277 u_32_t ipfo_size; /* size of object at ipfo_ptr */ 1278 void *ipfo_ptr; /* pointer to object */ 1279 int ipfo_type; /* type of object being pointed to */ 1280 int ipfo_offset; /* bytes from ipfo_ptr where to start */ 1281 int ipfo_retval; /* return value */ 1282 u_char ipfo_xxxpad[28]; /* reserved for future use */ 1283} ipfobj_t; 1284 1285#define IPFOBJ_FRENTRY 0 /* struct frentry */ 1286#define IPFOBJ_IPFSTAT 1 /* struct friostat */ 1287#define IPFOBJ_IPFINFO 2 /* struct fr_info */ 1288#define IPFOBJ_AUTHSTAT 3 /* struct fr_authstat */ 1289#define IPFOBJ_FRAGSTAT 4 /* struct ipfrstat */ 1290#define IPFOBJ_IPNAT 5 /* struct ipnat */ 1291#define IPFOBJ_NATSTAT 6 /* struct natstat */ 1292#define IPFOBJ_STATESAVE 7 /* struct ipstate_save */ 1293#define IPFOBJ_NATSAVE 8 /* struct nat_save */ 1294#define IPFOBJ_NATLOOKUP 9 /* struct natlookup */ 1295#define IPFOBJ_IPSTATE 10 /* struct ipstate */ 1296#define IPFOBJ_STATESTAT 11 /* struct ips_stat */ 1297#define IPFOBJ_FRAUTH 12 /* struct frauth */ 1298#define IPFOBJ_TUNEABLE 13 /* struct ipftune */ 1299#define IPFOBJ_NAT 14 /* struct nat */ 1300#define IPFOBJ_IPFITER 15 /* struct ipfruleiter */ 1301#define IPFOBJ_GENITER 16 /* struct ipfgeniter */ 1302#define IPFOBJ_GTABLE 17 /* struct ipftable */ 1303#define IPFOBJ_LOOKUPITER 18 /* struct ipflookupiter */ 1304#define IPFOBJ_STATETQTAB 19 /* struct ipftq * NSTATES */ 1305#define IPFOBJ_IPFEXPR 20 1306#define IPFOBJ_PROXYCTL 21 /* strct ap_ctl */ 1307#define IPFOBJ_FRIPF 22 /* structfripf */ 1308#define IPFOBJ_COUNT 23 /* How many #defines are above this? */ 1309 1310 1311typedef union ipftunevalptr { 1312 void *ipftp_void; 1313 u_long *ipftp_long; 1314 u_int *ipftp_int; 1315 u_short *ipftp_short; 1316 u_char *ipftp_char; 1317 u_long ipftp_offset; 1318} ipftunevalptr_t; 1319 1320typedef union ipftuneval { 1321 u_long ipftu_long; 1322 u_int ipftu_int; 1323 u_short ipftu_short; 1324 u_char ipftu_char; 1325} ipftuneval_t; 1326 1327struct ipftuneable; 1328typedef int (* ipftunefunc_t)(struct ipf_main_softc_s *, struct ipftuneable *, ipftuneval_t *); 1329 1330typedef struct ipftuneable { 1331 ipftunevalptr_t ipft_una; 1332 const char *ipft_name; 1333 u_long ipft_min; 1334 u_long ipft_max; 1335 int ipft_sz; 1336 int ipft_flags; 1337 struct ipftuneable *ipft_next; 1338 ipftunefunc_t ipft_func; 1339} ipftuneable_t; 1340 1341#define ipft_addr ipft_una.ipftp_void 1342#define ipft_plong ipft_una.ipftp_long 1343#define ipft_pint ipft_una.ipftp_int 1344#define ipft_pshort ipft_una.ipftp_short 1345#define ipft_pchar ipft_una.ipftp_char 1346 1347#define IPFT_RDONLY 1 /* read-only */ 1348#define IPFT_WRDISABLED 2 /* write when disabled only */ 1349 1350typedef struct ipftune { 1351 void *ipft_cookie; 1352 ipftuneval_t ipft_un; 1353 u_long ipft_min; 1354 u_long ipft_max; 1355 int ipft_sz; 1356 int ipft_flags; 1357 char ipft_name[80]; 1358} ipftune_t; 1359 1360#define ipft_vlong ipft_un.ipftu_long 1361#define ipft_vint ipft_un.ipftu_int 1362#define ipft_vshort ipft_un.ipftu_short 1363#define ipft_vchar ipft_un.ipftu_char 1364 1365/* 1366 * Hash table header 1367 */ 1368#define IPFHASH(x,y) typedef struct { \ 1369 ipfrwlock_t ipfh_lock; \ 1370 struct x *ipfh_head; \ 1371 } y 1372 1373/* 1374** HPUX Port 1375*/ 1376 1377#if !defined(CDEV_MAJOR) && defined (__FreeBSD_version) 1378# define CDEV_MAJOR 79 1379#endif 1380 1381#ifdef _KERNEL 1382# define FR_VERBOSE(verb_pr) 1383# define FR_DEBUG(verb_pr) 1384#else 1385extern void ipfkdebug(char *, ...); 1386extern void ipfkverbose(char *, ...); 1387# define FR_VERBOSE(verb_pr) ipfkverbose verb_pr 1388# define FR_DEBUG(verb_pr) ipfkdebug verb_pr 1389#endif 1390 1391/* 1392 * 1393 */ 1394typedef struct ipfruleiter { 1395 int iri_inout; 1396 char iri_group[FR_GROUPLEN]; 1397 int iri_active; 1398 int iri_nrules; 1399 int iri_v; /* No longer used (compatibility) */ 1400 frentry_t *iri_rule; 1401} ipfruleiter_t; 1402 1403/* 1404 * Values for iri_inout 1405 */ 1406#define F_IN 0 1407#define F_OUT 1 1408#define F_ACIN 2 1409#define F_ACOUT 3 1410 1411 1412typedef struct ipfgeniter { 1413 int igi_type; 1414 int igi_nitems; 1415 void *igi_data; 1416} ipfgeniter_t; 1417 1418#define IPFGENITER_IPF 0 1419#define IPFGENITER_NAT 1 1420#define IPFGENITER_IPNAT 2 1421#define IPFGENITER_FRAG 3 1422#define IPFGENITER_AUTH 4 1423#define IPFGENITER_STATE 5 1424#define IPFGENITER_NATFRAG 6 1425#define IPFGENITER_HOSTMAP 7 1426#define IPFGENITER_LOOKUP 8 1427 1428typedef struct ipftable { 1429 int ita_type; 1430 void *ita_table; 1431} ipftable_t; 1432 1433#define IPFTABLE_BUCKETS 1 1434#define IPFTABLE_BUCKETS_NATIN 2 1435#define IPFTABLE_BUCKETS_NATOUT 3 1436 1437 1438typedef struct ipf_v4_masktab_s { 1439 u_32_t imt4_active[33]; 1440 int imt4_masks[33]; 1441 int imt4_max; 1442} ipf_v4_masktab_t; 1443 1444typedef struct ipf_v6_masktab_s { 1445 i6addr_t imt6_active[129]; 1446 int imt6_masks[129]; 1447 int imt6_max; 1448} ipf_v6_masktab_t; 1449 1450 1451/* 1452 * 1453 */ 1454typedef struct ipftoken { 1455 struct ipftoken *ipt_next; 1456 struct ipftoken **ipt_pnext; 1457 void *ipt_ctx; 1458 void *ipt_data; 1459 u_long ipt_die; 1460 int ipt_type; 1461 int ipt_uid; 1462 int ipt_subtype; 1463 int ipt_ref; 1464 int ipt_complete; 1465} ipftoken_t; 1466 1467 1468/* 1469 * 1470 */ 1471typedef struct ipfexp { 1472 int ipfe_cmd; 1473 int ipfe_not; 1474 int ipfe_narg; 1475 int ipfe_size; 1476 int ipfe_arg0[1]; 1477} ipfexp_t; 1478 1479/* 1480 * Currently support commands (ipfe_cmd) 1481 * 32bits is split up follows: 1482 * aabbcccc 1483 * aa = 0 = packet matching, 1 = meta data matching 1484 * bb = IP protocol number 1485 * cccc = command 1486 */ 1487#define IPF_EXP_IP_PR 0x00000001 1488#define IPF_EXP_IP_ADDR 0x00000002 1489#define IPF_EXP_IP_SRCADDR 0x00000003 1490#define IPF_EXP_IP_DSTADDR 0x00000004 1491#define IPF_EXP_IP6_ADDR 0x00000005 1492#define IPF_EXP_IP6_SRCADDR 0x00000006 1493#define IPF_EXP_IP6_DSTADDR 0x00000007 1494#define IPF_EXP_TCP_FLAGS 0x00060001 1495#define IPF_EXP_TCP_PORT 0x00060002 1496#define IPF_EXP_TCP_SPORT 0x00060003 1497#define IPF_EXP_TCP_DPORT 0x00060004 1498#define IPF_EXP_UDP_PORT 0x00110002 1499#define IPF_EXP_UDP_SPORT 0x00110003 1500#define IPF_EXP_UDP_DPORT 0x00110004 1501#define IPF_EXP_IDLE_GT 0x01000001 1502#define IPF_EXP_TCP_STATE 0x01060002 1503#define IPF_EXP_END 0xffffffff 1504 1505#define ONE_DAY IPF_TTLVAL(1 * 86400) /* 1 day */ 1506#define FIVE_DAYS (5 * ONE_DAY) 1507 1508typedef struct ipf_main_softc_s { 1509 struct ipf_main_softc_s *ipf_next; 1510 ipfmutex_t ipf_rw; 1511 ipfmutex_t ipf_timeoutlock; 1512 ipfrwlock_t ipf_mutex; 1513 ipfrwlock_t ipf_frag; 1514 ipfrwlock_t ipf_global; 1515 ipfrwlock_t ipf_tokens; 1516 ipfrwlock_t ipf_state; 1517 ipfrwlock_t ipf_nat; 1518 ipfrwlock_t ipf_natfrag; 1519 ipfrwlock_t ipf_poolrw; 1520 int ipf_dynamic_softc; 1521 int ipf_refcnt; 1522 int ipf_running; 1523 int ipf_flags; 1524 int ipf_active; 1525 int ipf_control_forwarding; 1526 int ipf_update_ipid; 1527 int ipf_chksrc; /* causes a system crash if enabled */ 1528 int ipf_pass; 1529 int ipf_minttl; 1530 int ipf_icmpminfragmtu; 1531 int ipf_interror; /* Should be in a struct that is per */ 1532 /* thread or process. Does not belong */ 1533 /* here but there's a lot more work */ 1534 /* in doing that properly. For now, */ 1535 /* it is squatting. */ 1536 u_int ipf_tcpidletimeout; 1537 u_int ipf_tcpclosewait; 1538 u_int ipf_tcplastack; 1539 u_int ipf_tcptimewait; 1540 u_int ipf_tcptimeout; 1541 u_int ipf_tcpsynsent; 1542 u_int ipf_tcpsynrecv; 1543 u_int ipf_tcpclosed; 1544 u_int ipf_tcphalfclosed; 1545 u_int ipf_udptimeout; 1546 u_int ipf_udpacktimeout; 1547 u_int ipf_icmptimeout; 1548 u_int ipf_icmpacktimeout; 1549 u_int ipf_iptimeout; 1550 u_long ipf_ticks; 1551 u_long ipf_userifqs; 1552 u_long ipf_rb_no_mem; 1553 u_long ipf_rb_node_max; 1554 u_long ipf_frouteok[2]; 1555 ipftuneable_t *ipf_tuners; 1556 void *ipf_frag_soft; 1557 void *ipf_nat_soft; 1558 void *ipf_state_soft; 1559 void *ipf_auth_soft; 1560 void *ipf_proxy_soft; 1561 void *ipf_sync_soft; 1562 void *ipf_lookup_soft; 1563 void *ipf_log_soft; 1564 struct frgroup *ipf_groups[IPL_LOGSIZE][2]; 1565 frentry_t *ipf_rules[2][2]; 1566 frentry_t *ipf_acct[2][2]; 1567 frentry_t *ipf_rule_explist[2]; 1568 ipftoken_t *ipf_token_head; 1569 ipftoken_t **ipf_token_tail; 1570#if defined(__FreeBSD_version) && defined(_KERNEL) 1571 struct callout ipf_slow_ch; 1572#endif 1573#if NETBSD_GE_REV(104040000) 1574 struct callout ipf_slow_ch; 1575#endif 1576#if SOLARIS 1577 timeout_id_t ipf_slow_ch; 1578#endif 1579#if defined(_KERNEL) 1580# if SOLARIS 1581 struct pollhead ipf_poll_head[IPL_LOGSIZE]; 1582 void *ipf_dip; 1583# if defined(INSTANCES) 1584 int ipf_get_loopback; 1585 u_long ipf_idnum; 1586 net_handle_t ipf_nd_v4; 1587 net_handle_t ipf_nd_v6; 1588 hook_t *ipf_hk_v4_in; 1589 hook_t *ipf_hk_v4_out; 1590 hook_t *ipf_hk_v4_nic; 1591 hook_t *ipf_hk_v6_in; 1592 hook_t *ipf_hk_v6_out; 1593 hook_t *ipf_hk_v6_nic; 1594 hook_t *ipf_hk_loop_v4_in; 1595 hook_t *ipf_hk_loop_v4_out; 1596 hook_t *ipf_hk_loop_v6_in; 1597 hook_t *ipf_hk_loop_v6_out; 1598# endif 1599# else 1600 struct selinfo ipf_selwait[IPL_LOGSIZE]; 1601# endif 1602#endif 1603 void *ipf_slow; 1604 ipf_statistics_t ipf_stats[2]; 1605 u_char ipf_iss_secret[32]; 1606 u_short ipf_ip_id; 1607} ipf_main_softc_t; 1608 1609#define IPFERROR(_e) do { softc->ipf_interror = (_e); \ 1610 DT1(user_error, int, _e); \ 1611 } while (0) 1612 1613#ifndef _KERNEL 1614extern int ipf_check(void *, struct ip *, int, struct ifnet *, int, mb_t **); 1615extern struct ifnet *get_unit(char *, int); 1616extern char *get_ifname(struct ifnet *); 1617extern int ipfioctl(ipf_main_softc_t *, int, ioctlcmd_t, 1618 caddr_t, int); 1619extern void m_freem(mb_t *); 1620extern size_t msgdsize(mb_t *); 1621extern int bcopywrap(void *, void *, size_t); 1622extern void ip_fillid(struct ip *); 1623#else /* #ifndef _KERNEL */ 1624# if defined(__NetBSD__) && defined(PFIL_HOOKS) 1625extern void ipfilterattach(int); 1626# endif 1627extern int ipl_enable(void); 1628extern int ipl_disable(void); 1629# ifdef MENTAT 1630/* XXX MENTAT is always defined for Solaris */ 1631extern int ipf_check(void *, struct ip *, int, struct ifnet *, int, void *, 1632 mblk_t **); 1633# if SOLARIS 1634extern void ipf_prependmbt(fr_info_t *, mblk_t *); 1635extern int ipfioctl(dev_t, int, intptr_t, int, cred_t *, int *); 1636# endif 1637extern int ipf_qout(queue_t *, mblk_t *); 1638# else /* MENTAT */ 1639/* XXX MENTAT is never defined for FreeBSD & NetBSD */ 1640extern int ipf_check(void *, struct ip *, int, struct ifnet *, int, mb_t **); 1641extern int (*fr_checkp)(ip_t *, int, void *, int, mb_t **); 1642extern size_t mbufchainlen(mb_t *); 1643# ifdef IPFILTER_LKM 1644extern int ipf_identify(char *); 1645# endif 1646# if defined(__FreeBSD_version) 1647extern int ipfioctl(struct cdev*, u_long, caddr_t, int, struct thread *); 1648# elif defined(__NetBSD__) 1649extern int ipfioctl(dev_t, u_long, void *, int, struct lwp *); 1650# endif 1651# endif /* MENTAT */ 1652 1653# if defined(__FreeBSD_version) 1654extern int ipf_pfil_hook(void); 1655extern int ipf_pfil_unhook(void); 1656extern void ipf_event_reg(void); 1657extern void ipf_event_dereg(void); 1658# endif 1659 1660# if defined(INSTANCES) 1661extern ipf_main_softc_t *ipf_find_softc(u_long); 1662extern int ipf_set_loopback(ipf_main_softc_t *, ipftuneable_t *, 1663 ipftuneval_t *); 1664# endif 1665 1666#endif /* #ifndef _KERNEL */ 1667 1668extern char *memstr(const char *, char *, size_t, size_t); 1669extern int count4bits(u_32_t); 1670#ifdef USE_INET6 1671extern int count6bits(u_32_t *); 1672#endif 1673extern int frrequest(ipf_main_softc_t *, int, ioctlcmd_t, caddr_t, 1674 int, int); 1675extern char *getifname(struct ifnet *); 1676extern int ipfattach(ipf_main_softc_t *); 1677extern int ipfdetach(ipf_main_softc_t *); 1678extern u_short ipf_cksum(u_short *, int); 1679extern int copyinptr(ipf_main_softc_t *, void *, void *, size_t); 1680extern int copyoutptr(ipf_main_softc_t *, void *, void *, size_t); 1681extern int ipf_fastroute(mb_t *, mb_t **, fr_info_t *, frdest_t *); 1682extern int ipf_inject(fr_info_t *, mb_t *); 1683extern int ipf_inobj(ipf_main_softc_t *, void *, ipfobj_t *, 1684 void *, int); 1685extern int ipf_inobjsz(ipf_main_softc_t *, void *, void *, 1686 int , int); 1687extern int ipf_ioctlswitch(ipf_main_softc_t *, int, void *, 1688 ioctlcmd_t, int, int, void *); 1689extern int ipf_ipf_ioctl(ipf_main_softc_t *, caddr_t, ioctlcmd_t, 1690 int, int, void *); 1691extern int ipf_ipftune(ipf_main_softc_t *, ioctlcmd_t, void *); 1692extern int ipf_matcharray_load(ipf_main_softc_t *, caddr_t, 1693 ipfobj_t *, int **); 1694extern int ipf_matcharray_verify(int *, int); 1695extern int ipf_outobj(ipf_main_softc_t *, void *, void *, int); 1696extern int ipf_outobjk(ipf_main_softc_t *, ipfobj_t *, void *); 1697extern int ipf_outobjsz(ipf_main_softc_t *, void *, void *, 1698 int, int); 1699extern void *ipf_pullup(mb_t *, fr_info_t *, int); 1700extern int ipf_resolvedest(ipf_main_softc_t *, char *, 1701 struct frdest *, int); 1702extern int ipf_resolvefunc(ipf_main_softc_t *, void *); 1703extern void *ipf_resolvenic(ipf_main_softc_t *, char *, int); 1704extern int ipf_send_icmp_err(int, fr_info_t *, int); 1705extern int ipf_send_reset(fr_info_t *); 1706extern void ipf_apply_timeout(ipftq_t *, u_int); 1707extern ipftq_t *ipf_addtimeoutqueue(ipf_main_softc_t *, ipftq_t **, 1708 u_int); 1709extern void ipf_deletequeueentry(ipftqent_t *); 1710extern int ipf_deletetimeoutqueue(ipftq_t *); 1711extern void ipf_freetimeoutqueue(ipf_main_softc_t *, ipftq_t *); 1712extern void ipf_movequeue(u_long, ipftqent_t *, ipftq_t *, 1713 ipftq_t *); 1714extern void ipf_queueappend(u_long, ipftqent_t *, ipftq_t *, void *); 1715extern void ipf_queueback(u_long, ipftqent_t *); 1716extern int ipf_queueflush(ipf_main_softc_t *, ipftq_delete_fn_t, 1717 ipftq_t *, ipftq_t *, u_int *, int, int); 1718extern void ipf_queuefront(ipftqent_t *); 1719extern int ipf_settimeout_tcp(ipftuneable_t *, ipftuneval_t *, 1720 ipftq_t *); 1721extern int ipf_checkv4sum(fr_info_t *); 1722extern int ipf_checkl4sum(fr_info_t *); 1723extern int ipf_ifpfillv4addr(int, struct sockaddr_in *, 1724 struct sockaddr_in *, struct in_addr *, 1725 struct in_addr *); 1726extern int ipf_coalesce(fr_info_t *); 1727#ifdef USE_INET6 1728extern int ipf_checkv6sum(fr_info_t *); 1729extern int ipf_ifpfillv6addr(int, struct sockaddr_in6 *, 1730 struct sockaddr_in6 *, i6addr_t *, 1731 i6addr_t *); 1732#endif 1733 1734extern int ipf_tune_add(ipf_main_softc_t *, ipftuneable_t *); 1735extern int ipf_tune_add_array(ipf_main_softc_t *, ipftuneable_t *); 1736extern int ipf_tune_del(ipf_main_softc_t *, ipftuneable_t *); 1737extern int ipf_tune_del_array(ipf_main_softc_t *, ipftuneable_t *); 1738extern int ipf_tune_array_link(ipf_main_softc_t *, ipftuneable_t *); 1739extern int ipf_tune_array_unlink(ipf_main_softc_t *, 1740 ipftuneable_t *); 1741extern ipftuneable_t *ipf_tune_array_copy(void *, size_t, 1742 ipftuneable_t *); 1743 1744extern int ipf_pr_pullup(fr_info_t *, int); 1745 1746extern int ipf_flush(ipf_main_softc_t *, minor_t, int); 1747extern frgroup_t *ipf_group_add(ipf_main_softc_t *, char *, void *, 1748 u_32_t, minor_t, int); 1749extern void ipf_group_del(ipf_main_softc_t *, frgroup_t *, 1750 frentry_t *); 1751extern int ipf_derefrule(ipf_main_softc_t *, frentry_t **); 1752extern frgroup_t *ipf_findgroup(ipf_main_softc_t *, char *, minor_t, 1753 int, frgroup_t ***); 1754 1755extern int ipf_log_init(void); 1756extern int ipf_log_bytesused(ipf_main_softc_t *, int); 1757extern int ipf_log_canread(ipf_main_softc_t *, int); 1758extern int ipf_log_clear(ipf_main_softc_t *, minor_t); 1759extern u_long ipf_log_failures(ipf_main_softc_t *, int); 1760extern int ipf_log_read(ipf_main_softc_t *, minor_t, uio_t *); 1761extern int ipf_log_items(ipf_main_softc_t *, int, fr_info_t *, 1762 void **, size_t *, int *, int); 1763extern u_long ipf_log_logok(ipf_main_softc_t *, int); 1764extern void ipf_log_unload(ipf_main_softc_t *); 1765extern int ipf_log_pkt(fr_info_t *, u_int); 1766 1767extern frentry_t *ipf_acctpkt(fr_info_t *, u_32_t *); 1768extern u_short fr_cksum(fr_info_t *, ip_t *, int, void *); 1769extern void ipf_deinitialise(ipf_main_softc_t *); 1770extern int ipf_deliverlocal(ipf_main_softc_t *, int, void *, 1771 i6addr_t *); 1772extern frentry_t *ipf_dstgrpmap(fr_info_t *, u_32_t *); 1773extern void ipf_fixskip(frentry_t **, frentry_t *, int); 1774extern void ipf_forgetifp(ipf_main_softc_t *, void *); 1775extern frentry_t *ipf_getrulen(ipf_main_softc_t *, int, char *, 1776 u_32_t); 1777extern int ipf_ifpaddr(ipf_main_softc_t *, int, int, void *, 1778 i6addr_t *, i6addr_t *); 1779extern void ipf_inet_mask_add(int, ipf_v4_masktab_t *); 1780extern void ipf_inet_mask_del(int, ipf_v4_masktab_t *); 1781#ifdef USE_INET6 1782extern void ipf_inet6_mask_add(int, i6addr_t *, 1783 ipf_v6_masktab_t *); 1784extern void ipf_inet6_mask_del(int, i6addr_t *, 1785 ipf_v6_masktab_t *); 1786#endif 1787extern int ipf_initialise(void); 1788extern int ipf_lock(caddr_t, int *); 1789extern int ipf_makefrip(int, ip_t *, fr_info_t *); 1790extern int ipf_matchtag(ipftag_t *, ipftag_t *); 1791extern int ipf_matchicmpqueryreply(int, icmpinfo_t *, 1792 struct icmp *, int); 1793extern u_32_t ipf_newisn(fr_info_t *); 1794extern u_int ipf_pcksum(fr_info_t *, int, u_int); 1795#ifdef USE_INET6 1796extern u_int ipf_pcksum6(struct mbuf *, ip6_t *, 1797 u_int32_t, u_int32_t); 1798#endif 1799extern void ipf_rule_expire(ipf_main_softc_t *); 1800extern int ipf_scanlist(fr_info_t *, u_32_t); 1801extern frentry_t *ipf_srcgrpmap(fr_info_t *, u_32_t *); 1802extern int ipf_tcpudpchk(fr_ip_t *, frtuc_t *); 1803extern int ipf_verifysrc(fr_info_t *fin); 1804extern int ipf_zerostats(ipf_main_softc_t *, char *); 1805extern int ipf_getnextrule(ipf_main_softc_t *, ipftoken_t *, 1806 void *); 1807extern int ipf_sync(ipf_main_softc_t *, void *); 1808extern int ipf_token_deref(ipf_main_softc_t *, ipftoken_t *); 1809extern void ipf_token_expire(ipf_main_softc_t *); 1810extern ipftoken_t *ipf_token_find(ipf_main_softc_t *, int, int, 1811 void *); 1812extern int ipf_token_del(ipf_main_softc_t *, int, int, 1813 void *); 1814extern void ipf_token_mark_complete(ipftoken_t *); 1815extern int ipf_genericiter(ipf_main_softc_t *, void *, 1816 int, void *); 1817#ifdef IPFILTER_LOOKUP 1818extern void *ipf_resolvelookup(int, u_int, u_int, 1819 lookupfunc_t *); 1820#endif 1821extern u_32_t ipf_random(void); 1822 1823extern int ipf_main_load(void); 1824extern void *ipf_main_soft_create(void *); 1825extern void ipf_main_soft_destroy(ipf_main_softc_t *); 1826extern int ipf_main_soft_init(ipf_main_softc_t *); 1827extern int ipf_main_soft_fini(ipf_main_softc_t *); 1828extern int ipf_main_unload(void); 1829extern int ipf_load_all(void); 1830extern int ipf_unload_all(void); 1831extern void ipf_destroy_all(ipf_main_softc_t *); 1832extern ipf_main_softc_t *ipf_create_all(void *); 1833extern int ipf_init_all(ipf_main_softc_t *); 1834extern int ipf_fini_all(ipf_main_softc_t *); 1835extern void ipf_log_soft_destroy(ipf_main_softc_t *, void *); 1836extern void *ipf_log_soft_create(ipf_main_softc_t *); 1837extern int ipf_log_soft_init(ipf_main_softc_t *, void *); 1838extern int ipf_log_soft_fini(ipf_main_softc_t *, void *); 1839extern int ipf_log_main_load(void); 1840extern int ipf_log_main_unload(void); 1841 1842 1843extern char ipfilter_version[]; 1844#ifdef USE_INET6 1845extern int icmptoicmp6types[ICMP_MAXTYPE+1]; 1846extern int icmptoicmp6unreach[ICMP_MAX_UNREACH]; 1847extern int icmpreplytype6[ICMP6_MAXTYPE + 1]; 1848#endif 1849#ifdef IPFILTER_COMPAT 1850extern int ipf_in_compat(ipf_main_softc_t *, ipfobj_t *, void *,int); 1851extern int ipf_out_compat(ipf_main_softc_t *, ipfobj_t *, void *); 1852#endif 1853extern int icmpreplytype4[ICMP_MAXTYPE + 1]; 1854 1855extern int ipf_ht_node_add(ipf_main_softc_t *, host_track_t *, 1856 int, i6addr_t *); 1857extern int ipf_ht_node_del(host_track_t *, int, i6addr_t *); 1858extern void ipf_rb_ht_flush(host_track_t *); 1859extern void ipf_rb_ht_freenode(host_node_t *, void *); 1860extern void ipf_rb_ht_init(host_track_t *); 1861 1862#endif /* __IP_FIL_H__ */ 1863