]>
git.saurik.com Git - apple/xnu.git/blob - bsd/netinet/ip_fil.h
2 * Copyright (c) 2000 Apple Computer, Inc. All rights reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * The contents of this file constitute Original Code as defined in and
7 * are subject to the Apple Public Source License Version 1.1 (the
8 * "License"). You may not use this file except in compliance with the
9 * License. Please obtain a copy of the License at
10 * http://www.apple.com/publicsource and read it before using this file.
12 * This Original Code and all software distributed under the License are
13 * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
14 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
15 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
16 * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
17 * License for the specific language governing rights and limitations
20 * @APPLE_LICENSE_HEADER_END@
23 * Copyright (C) 1993-1997 by Darren Reed.
25 * Redistribution and use in source and binary forms are permitted
26 * provided that this notice is preserved and due credit is given
27 * to the original author and the contributors.
29 * @(#)ip_fil.h 1.35 6/5/96
30 * $Id: ip_fil.h,v 1.3 2000/11/22 01:12:12 zarzycki Exp $
37 * Pathnames for various IP Filter control devices. Used by LKM
38 * and userland, so defined here.
40 #define IPNAT_NAME "/dev/ipnat"
41 #define IPSTATE_NAME "/dev/ipstate"
42 #define IPAUTH_NAME "/dev/ipauth"
45 #define SOLARIS (defined(sun) && (defined(__svr4__) || defined(__SVR4)))
48 #if defined(KERNEL) && !defined(_KERNEL)
60 #if defined(__STDC__) || defined(__GNUC__)
61 #define SIOCADAFR _IOW('r', 60, struct frentry)
62 #define SIOCRMAFR _IOW('r', 61, struct frentry)
63 #define SIOCSETFF _IOW('r', 62, u_int)
64 #define SIOCGETFF _IOR('r', 63, u_int)
65 #define SIOCGETFS _IOR('r', 64, struct friostat)
66 #define SIOCIPFFL _IOWR('r', 65, int)
67 #define SIOCIPFFB _IOR('r', 66, int)
68 #define SIOCADIFR _IOW('r', 67, struct frentry)
69 #define SIOCRMIFR _IOW('r', 68, struct frentry)
70 #define SIOCSWAPA _IOR('r', 69, u_int)
71 #define SIOCINAFR _IOW('r', 70, struct frentry)
72 #define SIOCINIFR _IOW('r', 71, struct frentry)
73 #define SIOCFRENB _IOW('r', 72, u_int)
74 #define SIOCFRSYN _IOW('r', 73, u_int)
75 #define SIOCFRZST _IOWR('r', 74, struct friostat)
76 #define SIOCZRLST _IOWR('r', 75, struct frentry)
77 #define SIOCAUTHW _IOWR('r', 76, struct fr_info)
78 #define SIOCAUTHR _IOWR('r', 77, struct fr_info)
79 #define SIOCATHST _IOWR('r', 78, struct fr_authstat)
81 #define SIOCADAFR _IOW(r, 60, struct frentry)
82 #define SIOCRMAFR _IOW(r, 61, struct frentry)
83 #define SIOCSETFF _IOW(r, 62, u_int)
84 #define SIOCGETFF _IOR(r, 63, u_int)
85 #define SIOCGETFS _IOR(r, 64, struct friostat)
86 #define SIOCIPFFL _IOWR(r, 65, int)
87 #define SIOCIPFFB _IOR(r, 66, int)
88 #define SIOCADIFR _IOW(r, 67, struct frentry)
89 #define SIOCRMIFR _IOW(r, 68, struct frentry)
90 #define SIOCSWAPA _IOR(r, 69, u_int)
91 #define SIOCINAFR _IOW(r, 70, struct frentry)
92 #define SIOCINIFR _IOW(r, 71, struct frentry)
93 #define SIOCFRENB _IOW(r, 72, u_int)
94 #define SIOCFRSYN _IOW(r, 73, u_int)
95 #define SIOCFRZST _IOWR(r, 74, struct friostat)
96 #define SIOCZRLST _IOWR(r, 75, struct frentry)
97 #define SIOCAUTHW _IOWR(r, 76, struct fr_info)
98 #define SIOCAUTHR _IOWR(r, 77, struct fr_info)
99 #define SIOCATHST _IOWR(r, 78, struct fr_authstat)
101 #define SIOCADDFR SIOCADAFR
102 #define SIOCDELFR SIOCRMAFR
103 #define SIOCINSFR SIOCINAFR
105 typedef struct fr_ip
{
106 u_int fi_v
:4; /* IP version */
107 u_int fi_fl
:4; /* packet flags */
111 struct in_addr fi_src
;
112 struct in_addr fi_dst
;
113 u_32_t fi_optmsk
; /* bitmask composed from IP options */
114 u_short fi_secmsk
; /* bitmask composed from IP security options */
118 #define FI_OPTIONS (FF_OPTIONS >> 24)
119 #define FI_TCPUDP (FF_TCPUDP >> 24) /* TCP/UCP implied comparison*/
120 #define FI_FRAG (FF_FRAG >> 24)
121 #define FI_SHORT (FF_SHORT >> 24)
123 typedef struct fr_info
{
129 u_char fin_icode
; /* From here on is packet specific */
135 struct frentry
*fin_fr
;
136 char *fin_dp
; /* start of data past IP header */
141 * Size for compares on fr_info structures
143 #define FI_CSIZE (sizeof(struct fr_ip) + sizeof(u_short) * 4 + \
146 * Size for copying cache fr_info structure
148 #define FI_COPYSIZE (sizeof(fr_info_t) - sizeof(void *) * 2)
150 typedef struct frdest
{
152 struct in_addr fd_ip
;
153 char fd_ifname
[IFNAMSIZ
];
156 typedef struct frentry
{
157 struct frentry
*fr_next
;
158 u_short fr_group
; /* group to which this rule belongs */
159 u_short fr_grhead
; /* group # which this rule starts */
160 struct frentry
*fr_grp
;
161 int fr_ref
; /* reference count - for grouping */
164 * These are only incremented when a packet matches this rule and
165 * it is the last match
170 * Fields after this may not change whilst in the kernel.
173 struct fr_ip fr_mip
; /* mask structure */
175 u_char fr_tcpfm
; /* tcp flags mask */
176 u_char fr_tcpf
; /* tcp flags */
178 u_short fr_icmpm
; /* data for ICMP packets (mask) */
181 u_char fr_scmp
; /* data for port comparisons */
185 u_short fr_stop
; /* top port for <> and >< */
186 u_short fr_dtop
; /* top port for <> and >< */
187 u_32_t fr_flags
; /* per-rule flags && options (see below) */
188 int fr_skip
; /* # of rules to skip */
189 int (*fr_func
) __P((int, ip_t
*, fr_info_t
*)); /* call this function */
190 char fr_icode
; /* return ICMP code */
191 char fr_ifname
[IFNAMSIZ
];
192 struct frdest fr_tif
; /* "to" interface */
193 struct frdest fr_dif
; /* duplicate packet interfaces */
196 #define fr_proto fr_ip.fi_p
197 #define fr_ttl fr_ip.fi_ttl
198 #define fr_tos fr_ip.fi_tos
199 #define fr_dst fr_ip.fi_dst
200 #define fr_src fr_ip.fi_src
201 #define fr_dmsk fr_mip.fi_dst
202 #define fr_smsk fr_mip.fi_src
205 #define offsetof(t,m) (int)((&((t *)0L)->m))
207 #define FR_CMPSIZ (sizeof(struct frentry) - offsetof(frentry_t, fr_ip))
212 #define FR_BLOCK 0x00001 /* do not allow packet to pass */
213 #define FR_PASS 0x00002 /* allow packet to pass */
214 #define FR_OUTQUE 0x00004 /* outgoing packets */
215 #define FR_INQUE 0x00008 /* ingoing packets */
216 #define FR_LOG 0x00010 /* Log */
217 #define FR_LOGB 0x00011 /* Log-fail */
218 #define FR_LOGP 0x00012 /* Log-pass */
219 #define FR_LOGBODY 0x00020 /* Log the body */
220 #define FR_LOGFIRST 0x00040 /* Log the first byte if state held */
221 #define FR_RETRST 0x00080 /* Return TCP RST packet - reset connection */
222 #define FR_RETICMP 0x00100 /* Return ICMP unreachable packet */
223 #define FR_NOMATCH 0x00200 /* no match occured */
224 #define FR_ACCOUNT 0x00400 /* count packet bytes */
225 #define FR_KEEPFRAG 0x00800 /* keep fragment information */
226 #define FR_KEEPSTATE 0x01000 /* keep `connection' state information */
227 #define FR_INACTIVE 0x02000
228 #define FR_QUICK 0x04000 /* match & stop processing list */
229 #define FR_FASTROUTE 0x08000 /* bypass normal routing */
230 #define FR_CALLNOW 0x10000 /* call another function (fr_func) if matches */
231 #define FR_DUP 0x20000 /* duplicate packet */
232 #define FR_LOGORBLOCK 0x40000 /* block the packet if it can't be logged */
233 #define FR_NOTSRCIP 0x80000 /* not the src IP# */
234 #define FR_NOTDSTIP 0x100000 /* not the dst IP# */
235 #define FR_AUTH 0x200000 /* use authentication */
236 #define FR_PREAUTH 0x400000 /* require preauthentication */
238 #define FR_LOGMASK (FR_LOG|FR_LOGP|FR_LOGB)
241 * These correspond to #define's for FI_* and are stored in fr_flags
243 #define FF_OPTIONS 0x01000000
244 #define FF_TCPUDP 0x02000000
245 #define FF_FRAG 0x04000000
246 #define FF_SHORT 0x08000000
248 * recognized flags for SIOCGETFF and SIOCSETFF, and get put in fr_flags
250 #define FF_LOGPASS 0x10000000
251 #define FF_LOGBLOCK 0x20000000
252 #define FF_LOGNOMATCH 0x40000000
253 #define FF_LOGGING (FF_LOGPASS|FF_LOGBLOCK|FF_LOGNOMATCH)
254 #define FF_BLOCKNONIP 0x80000000 /* Solaris2 Only */
260 #define FR_GREATERT 4
262 #define FR_GREATERTE 6
263 #define FR_OUTRANGE 7
266 typedef struct filterstats
{
267 u_long fr_pass
; /* packets allowed */
268 u_long fr_block
; /* packets denied */
269 u_long fr_nom
; /* packets which don't match any rule */
270 u_long fr_ppkl
; /* packets allowed and logged */
271 u_long fr_bpkl
; /* packets denied and logged */
272 u_long fr_npkl
; /* packets unmatched and logged */
273 u_long fr_pkl
; /* packets logged */
274 u_long fr_skip
; /* packets to be logged but buffer full */
275 u_long fr_ret
; /* packets for which a return is sent */
276 u_long fr_acct
; /* packets for which counting was performed */
277 u_long fr_bnfr
; /* bad attempts to allocate fragment state */
278 u_long fr_nfr
; /* new fragment state kept */
279 u_long fr_cfr
; /* add new fragment state but complete pkt */
280 u_long fr_bads
; /* bad attempts to allocate packet state */
281 u_long fr_ads
; /* new packet state kept */
282 u_long fr_chit
; /* cached hit */
283 u_long fr_tcpbad
; /* TCP checksum check failures */
284 u_long fr_pull
[2]; /* good and bad pullup attempts */
286 u_long fr_bad
; /* bad IP packets to the filter */
287 u_long fr_notip
; /* packets passed through no on ip queue */
288 u_long fr_drop
; /* packets dropped - no info for them! */
295 typedef struct friostat
{
296 struct filterstats f_st
[2];
297 struct frentry
*f_fin
[2];
298 struct frentry
*f_fout
[2];
299 struct frentry
*f_acctin
[2];
300 struct frentry
*f_acctout
[2];
301 struct frentry
*f_auth
;
306 typedef struct optlist
{
313 * Group list structure.
315 typedef struct frgroup
{
317 struct frgroup
*fg_next
;
318 struct frentry
*fg_head
;
319 struct frentry
**fg_start
;
324 * Log structure. Each packet header logged is prepended by one of these.
325 * Following this in the log records read from the device will be an ipflog
326 * structure which is then followed by any packet data.
328 typedef struct iplog
{
335 struct iplog
*ipl_next
;
338 #define IPL_MAGIC 0x49504c4d /* 'IPLM' */
340 typedef struct ipflog
{
341 #if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199603)) || \
342 (defined(OpenBSD) && (OpenBSD >= 199603))
343 u_char fl_ifname
[IFNAMSIZ
];
348 u_char fl_plen
; /* extra data after hlen */
349 u_char fl_hlen
; /* length of IP headers saved */
350 u_short fl_rule
; /* assume never more than 64k rules, total */
356 #ifndef ICMP_UNREACH_FILTER
357 #define ICMP_UNREACH_FILTER 13
361 #define IPF_LOGGING 0
363 #ifndef IPF_DEFAULT_PASS
364 #define IPF_DEFAULT_PASS FR_PASS
367 #define IPMINLEN(i, h) ((i)->ip_len >= ((i)->ip_hl * 4 + sizeof(struct h)))
368 #define IPLLOGSIZE 8192
371 * Device filenames for reading log information. Use ipf on Solaris2 because
372 * ipl is already a name used by something else.
376 # define IPL_NAME "/dev/ipf"
378 # define IPL_NAME "/dev/ipl"
381 #define IPL_NAT IPNAT_NAME
382 #define IPL_STATE IPSTATE_NAME
383 #define IPL_AUTH IPAUTH_NAME
385 #define IPL_LOGIPF 0 /* Minor device #'s for accessing logs */
387 #define IPL_LOGSTATE 2
388 #define IPL_LOGAUTH 3
391 #if !defined(CDEV_MAJOR) && defined (__FreeBSD_version) && \
392 (__FreeBSD_version >= 220000)
393 # define CDEV_MAJOR 79
398 extern int fr_check
__P((ip_t
*, int, void *, int, mb_t
**));
399 extern int (*fr_checkp
) __P((ip_t
*, int, void *, int, mb_t
**));
400 extern int send_reset
__P((ip_t
*, struct ifnet
*));
401 extern int icmp_error
__P((ip_t
*, struct ifnet
*));
402 extern int ipf_log
__P((void));
403 extern void ipfr_fastroute
__P((ip_t
*, fr_info_t
*, frdest_t
*));
404 extern struct ifnet
*get_unit
__P((char *));
405 # define FR_SCANLIST(p, ip, fi, m) fr_scanlist(p, ip, fi, m)
406 # if defined(__NetBSD__) || defined(__OpenBSD__) || \
407 (_BSDI_VERSION >= 199701) || (__FreeBSD_version >= 300003)
408 extern int iplioctl
__P((dev_t
, u_long
, caddr_t
, int));
410 extern int iplioctl
__P((dev_t
, int, caddr_t
, int));
412 extern int iplopen
__P((dev_t
, int));
413 extern int iplclose
__P((dev_t
, int));
414 #else /* #ifndef _KERNEL */
415 # if defined(__NetBSD__) && defined(PFIL_HOOKS)
416 extern int ipfilterattach
__P((int));
418 extern int iplattach
__P((void));
419 extern int ipl_enable
__P((void));
420 extern int ipl_disable
__P((void));
421 extern void ipflog_init
__P((void));
422 extern int ipflog_clear
__P((int));
423 extern int ipflog_read
__P((int, struct uio
*));
424 extern int ipflog
__P((u_int
, ip_t
*, fr_info_t
*, mb_t
*));
425 extern int ipllog
__P((int, u_long
, void **, size_t *, int *, int));
427 extern int fr_check
__P((ip_t
*, int, void *, int, qif_t
*, mb_t
**));
428 extern int (*fr_checkp
) __P((ip_t
*, int, void *,
429 int, qif_t
*, mb_t
**));
430 extern int icmp_error
__P((ip_t
*, int, int, qif_t
*,
432 extern int iplioctl
__P((dev_t
, int, int, int, cred_t
*, int *));
433 extern int iplopen
__P((dev_t
*, int, int, cred_t
*));
434 extern int iplclose
__P((dev_t
, int, int, cred_t
*));
435 extern int ipfsync
__P((void));
436 extern int send_reset
__P((ip_t
*, qif_t
*));
437 extern int ipfr_fastroute
__P((qif_t
*, ip_t
*, mblk_t
*, mblk_t
**,
438 fr_info_t
*, frdest_t
*));
439 extern void copyin_mblk
__P((mblk_t
*, int, int, char *));
440 extern void copyout_mblk
__P((mblk_t
*, int, int, char *));
441 extern int fr_qin
__P((queue_t
*, mblk_t
*));
442 extern int fr_qout
__P((queue_t
*, mblk_t
*));
444 extern int iplread
__P((dev_t
, struct uio
*, cred_t
*));
447 extern int fr_check
__P((ip_t
*, int, void *, int, mb_t
**));
448 extern int (*fr_checkp
) __P((ip_t
*, int, void *, int, mb_t
**));
450 extern int send_reset
__P((tcpiphdr_t
*, struct ifnet
*));
452 extern int send_reset
__P((tcpiphdr_t
*));
454 extern void ipfr_fastroute
__P((mb_t
*, fr_info_t
*, frdest_t
*));
455 extern size_t mbufchainlen
__P((mb_t
*));
457 # include <sys/cred.h>
458 extern int iplioctl
__P((dev_t
, int, caddr_t
, int, cred_t
*, int *));
459 extern int iplopen
__P((dev_t
*, int, int, cred_t
*));
460 extern int iplclose
__P((dev_t
, int, int, cred_t
*));
461 extern int iplread
__P((dev_t
, struct uio
*, cred_t
*));
462 extern int ipfsync
__P((void));
463 extern int ipfilter_sgi_attach
__P((void));
464 extern void ipfilter_sgi_detach
__P((void));
465 extern void ipfilter_sgi_intfsync
__P((void));
468 extern int iplidentify
__P((char *));
470 # if (_BSDI_VERSION >= 199510) || (__FreeBSD_version >= 220000) || \
472 # if defined(__NetBSD__) || (_BSDI_VERSION >= 199701) || \
473 (__FreeBSD_version >= 300003)
474 extern int iplioctl
__P((dev_t
, u_long
, caddr_t
, int, struct proc
*));
476 extern int iplioctl
__P((dev_t
, int, caddr_t
, int, struct proc
*));
478 extern int iplopen
__P((dev_t
, int, int, struct proc
*));
479 extern int iplclose
__P((dev_t
, int, int, struct proc
*));
481 # if defined(__OpenBSD__)
482 extern int iplioctl
__P((dev_t
, u_long
, caddr_t
, int));
483 # else /* __OpenBSD__ */
485 extern int iplioctl
__P((dev_t
, int, caddr_t
, int));
487 extern int iplioctl(struct inode
*, struct file
*, u_int
, u_long
);
489 # endif /* __OpenBSD__ */
491 extern int iplopen
__P((dev_t
, int));
492 extern int iplclose
__P((dev_t
, int));
494 extern int iplopen
__P((struct inode
*, struct file
*));
495 extern void iplclose
__P((struct inode
*, struct file
*));
497 # endif /* (_BSDI_VERSION >= 199510) */
499 extern int iplread
__P((dev_t
, struct uio
*, int));
502 extern int iplread
__P((dev_t
, struct uio
*));
504 extern int iplread(struct inode
*, struct file
*, char *, int);
506 # endif /* BSD >= 199306 */
508 # endif /* SOLARIS */
509 #endif /* #ifndef _KERNEL */
512 * Post NetBSD 1.2 has the PFIL interface for packet filters. This turns
513 * on those hooks. We don't need any special mods in non-IP Filter code
516 #if (defined(NetBSD) && (NetBSD > 199609) && (NetBSD <= 1991011)) || \
517 (defined(NetBSD1_2) && NetBSD1_2 > 1)
521 extern int ipldetach
__P((void));
522 extern u_short fr_tcpsum
__P((mb_t
*, ip_t
*, tcphdr_t
*, int));
523 #define FR_SCANLIST(p, ip, fi, m) fr_scanlist(p, ip, fi, m)
524 extern int fr_scanlist
__P((int, ip_t
*, fr_info_t
*, void *));
525 extern u_short ipf_cksum
__P((u_short
*, int));
526 extern int fr_copytolog
__P((int, char *, int));
527 extern void frflush
__P((int, int *));
528 extern frgroup_t
*fr_addgroup
__P((u_short
, frentry_t
*, int, int));
529 extern frgroup_t
*fr_findgroup
__P((u_short
, u_32_t
, int, int, frgroup_t
***));
530 extern void fr_delgroup
__P((u_short
, u_32_t
, int, int));
531 extern int ipl_unreach
;
532 extern int ipl_inited
;
533 extern u_long ipl_frouteok
[2];
536 extern int fr_active
;
537 extern fr_info_t frcache
[2];
539 extern iplog_t
**iplh
[IPL_LOGMAX
+1], *iplt
[IPL_LOGMAX
+1];
540 extern int iplused
[IPL_LOGMAX
+ 1];
542 extern struct frentry
*ipfilter
[2][2], *ipacct
[2][2];
543 extern struct frgroup
*ipfgroups
[3][2];
544 extern struct filterstats frstats
[];
546 #endif /* __IP_FIL_H__ */