1 /* 2 * Copyright (c) 2001 Daniel Hartmeier 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 9 * - Redistributions of source code must retain the above copyright 10 * notice, this list of conditions and the following disclaimer. 11 * - Redistributions in binary form must reproduce the above 12 * copyright notice, this list of conditions and the following 13 * disclaimer in the documentation and/or other materials provided 14 * with the distribution. 15 * 16 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 17 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 18 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 19 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE 20 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 22 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 23 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER 24 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN 26 * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 27 * POSSIBILITY OF SUCH DAMAGE. 28 * 29 * $OpenBSD: pfvar.h,v 1.282 2009/01/29 15:12:28 pyr Exp $ 30 * $FreeBSD$ 31 */ 32 33 #ifndef _NET_PFVAR_H_ 34 #define _NET_PFVAR_H_ 35 36 #include <sys/counter.h> 37 #include <sys/tree.h> 38 #include <sys/queue.h> 39 40 #include <net/radix.h> 41 #include <netinet/in.h> 42 43 #include <netpfil/pf/pf.h> 44 #include <netpfil/pf/pf_altq.h> 45 46 #ifndef __packed 47 #define __packed __attribute__((__packed__)) 48 #endif 49 50 struct pf_addr { 51 union { 52 struct in_addr v4; 53 struct in6_addr v6; 54 u_int8_t addr8[16]; 55 u_int16_t addr16[8]; 56 u_int32_t addr32[4]; 57 } pfa; /* 128-bit address */ 58 #define v4 pfa.v4 59 #define v6 pfa.v6 60 #define addr8 pfa.addr8 61 #define addr16 pfa.addr16 62 #define addr32 pfa.addr32 63 }; 64 65 #define PFI_AFLAG_NETWORK 0x01 66 #define PFI_AFLAG_BROADCAST 0x02 67 #define PFI_AFLAG_PEER 0x04 68 #define PFI_AFLAG_MODEMASK 0x07 69 #define PFI_AFLAG_NOALIAS 0x08 70 71 struct pf_addr_wrap { 72 union { 73 struct { 74 struct pf_addr addr; 75 struct pf_addr mask; 76 } a; 77 char ifname[IFNAMSIZ]; 78 char tblname[PF_TABLE_NAME_SIZE]; 79 } v; 80 union { 81 struct pfi_dynaddr *dyn; 82 struct pfr_ktable *tbl; 83 int dyncnt; 84 int tblcnt; 85 } p; 86 u_int8_t type; /* PF_ADDR_* */ 87 u_int8_t iflags; /* PFI_AFLAG_* */ 88 }; 89 90 /* Both IPv4 and IPv6 */ 91 #ifdef PF_INET_INET6 92 93 #define PF_AEQ(a, b, c) \ 94 ((c == AF_INET && (a)->addr32[0] == (b)->addr32[0]) || \ 95 (c == AF_INET6 && (a)->addr32[3] == (b)->addr32[3] && \ 96 (a)->addr32[2] == (b)->addr32[2] && \ 97 (a)->addr32[1] == (b)->addr32[1] && \ 98 (a)->addr32[0] == (b)->addr32[0])) \ 99 100 #define PF_ANEQ(a, b, c) \ 101 ((c == AF_INET && (a)->addr32[0] != (b)->addr32[0]) || \ 102 (c == AF_INET6 && ((a)->addr32[0] != (b)->addr32[0] || \ 103 (a)->addr32[1] != (b)->addr32[1] || \ 104 (a)->addr32[2] != (b)->addr32[2] || \ 105 (a)->addr32[3] != (b)->addr32[3]))) \ 106 107 #define PF_AZERO(a, c) \ 108 ((c == AF_INET && !(a)->addr32[0]) || \ 109 (c == AF_INET6 && !(a)->addr32[0] && !(a)->addr32[1] && \ 110 !(a)->addr32[2] && !(a)->addr32[3] )) \ 111 112 #define PF_MATCHA(n, a, m, b, f) \ 113 pf_match_addr(n, a, m, b, f) 114 115 #define PF_ACPY(a, b, f) \ 116 pf_addrcpy(a, b, f) 117 118 #define PF_AINC(a, f) \ 119 pf_addr_inc(a, f) 120 121 #define PF_POOLMASK(a, b, c, d, f) \ 122 pf_poolmask(a, b, c, d, f) 123 124 #else 125 126 /* Just IPv6 */ 127 128 #ifdef PF_INET6_ONLY 129 130 #define PF_AEQ(a, b, c) \ 131 ((a)->addr32[3] == (b)->addr32[3] && \ 132 (a)->addr32[2] == (b)->addr32[2] && \ 133 (a)->addr32[1] == (b)->addr32[1] && \ 134 (a)->addr32[0] == (b)->addr32[0]) \ 135 136 #define PF_ANEQ(a, b, c) \ 137 ((a)->addr32[3] != (b)->addr32[3] || \ 138 (a)->addr32[2] != (b)->addr32[2] || \ 139 (a)->addr32[1] != (b)->addr32[1] || \ 140 (a)->addr32[0] != (b)->addr32[0]) \ 141 142 #define PF_AZERO(a, c) \ 143 (!(a)->addr32[0] && \ 144 !(a)->addr32[1] && \ 145 !(a)->addr32[2] && \ 146 !(a)->addr32[3] ) \ 147 148 #define PF_MATCHA(n, a, m, b, f) \ 149 pf_match_addr(n, a, m, b, f) 150 151 #define PF_ACPY(a, b, f) \ 152 pf_addrcpy(a, b, f) 153 154 #define PF_AINC(a, f) \ 155 pf_addr_inc(a, f) 156 157 #define PF_POOLMASK(a, b, c, d, f) \ 158 pf_poolmask(a, b, c, d, f) 159 160 #else 161 162 /* Just IPv4 */ 163 #ifdef PF_INET_ONLY 164 165 #define PF_AEQ(a, b, c) \ 166 ((a)->addr32[0] == (b)->addr32[0]) 167 168 #define PF_ANEQ(a, b, c) \ 169 ((a)->addr32[0] != (b)->addr32[0]) 170 171 #define PF_AZERO(a, c) \ 172 (!(a)->addr32[0]) 173 174 #define PF_MATCHA(n, a, m, b, f) \ 175 pf_match_addr(n, a, m, b, f) 176 177 #define PF_ACPY(a, b, f) \ 178 (a)->v4.s_addr = (b)->v4.s_addr 179 180 #define PF_AINC(a, f) \ 181 do { \ 182 (a)->addr32[0] = htonl(ntohl((a)->addr32[0]) + 1); \ 183 } while (0) 184 185 #define PF_POOLMASK(a, b, c, d, f) \ 186 do { \ 187 (a)->addr32[0] = ((b)->addr32[0] & (c)->addr32[0]) | \ 188 (((c)->addr32[0] ^ 0xffffffff ) & (d)->addr32[0]); \ 189 } while (0) 190 191 #endif /* PF_INET_ONLY */ 192 #endif /* PF_INET6_ONLY */ 193 #endif /* PF_INET_INET6 */ 194 195 /* 196 * XXX callers not FIB-aware in our version of pf yet. 197 * OpenBSD fixed it later it seems, 2010/05/07 13:33:16 claudio. 198 */ 199 #define PF_MISMATCHAW(aw, x, af, neg, ifp, rtid) \ 200 ( \ 201 (((aw)->type == PF_ADDR_NOROUTE && \ 202 pf_routable((x), (af), NULL, (rtid))) || \ 203 (((aw)->type == PF_ADDR_URPFFAILED && (ifp) != NULL && \ 204 pf_routable((x), (af), (ifp), (rtid))) || \ 205 ((aw)->type == PF_ADDR_TABLE && \ 206 !pfr_match_addr((aw)->p.tbl, (x), (af))) || \ 207 ((aw)->type == PF_ADDR_DYNIFTL && \ 208 !pfi_match_addr((aw)->p.dyn, (x), (af))) || \ 209 ((aw)->type == PF_ADDR_RANGE && \ 210 !pf_match_addr_range(&(aw)->v.a.addr, \ 211 &(aw)->v.a.mask, (x), (af))) || \ 212 ((aw)->type == PF_ADDR_ADDRMASK && \ 213 !PF_AZERO(&(aw)->v.a.mask, (af)) && \ 214 !PF_MATCHA(0, &(aw)->v.a.addr, \ 215 &(aw)->v.a.mask, (x), (af))))) != \ 216 (neg) \ 217 ) 218 219 220 struct pf_rule_uid { 221 uid_t uid[2]; 222 u_int8_t op; 223 }; 224 225 struct pf_rule_gid { 226 uid_t gid[2]; 227 u_int8_t op; 228 }; 229 230 struct pf_rule_addr { 231 struct pf_addr_wrap addr; 232 u_int16_t port[2]; 233 u_int8_t neg; 234 u_int8_t port_op; 235 }; 236 237 struct pf_pooladdr { 238 struct pf_addr_wrap addr; 239 TAILQ_ENTRY(pf_pooladdr) entries; 240 char ifname[IFNAMSIZ]; 241 struct pfi_kif *kif; 242 }; 243 244 TAILQ_HEAD(pf_palist, pf_pooladdr); 245 246 struct pf_poolhashkey { 247 union { 248 u_int8_t key8[16]; 249 u_int16_t key16[8]; 250 u_int32_t key32[4]; 251 } pfk; /* 128-bit hash key */ 252 #define key8 pfk.key8 253 #define key16 pfk.key16 254 #define key32 pfk.key32 255 }; 256 257 struct pf_pool { 258 struct pf_palist list; 259 struct pf_pooladdr *cur; 260 struct pf_poolhashkey key; 261 struct pf_addr counter; 262 int tblidx; 263 u_int16_t proxy_port[2]; 264 u_int8_t opts; 265 }; 266 267 268 /* A packed Operating System description for fingerprinting */ 269 typedef u_int32_t pf_osfp_t; 270 #define PF_OSFP_ANY ((pf_osfp_t)0) 271 #define PF_OSFP_UNKNOWN ((pf_osfp_t)-1) 272 #define PF_OSFP_NOMATCH ((pf_osfp_t)-2) 273 274 struct pf_osfp_entry { 275 SLIST_ENTRY(pf_osfp_entry) fp_entry; 276 pf_osfp_t fp_os; 277 int fp_enflags; 278 #define PF_OSFP_EXPANDED 0x001 /* expanded entry */ 279 #define PF_OSFP_GENERIC 0x002 /* generic signature */ 280 #define PF_OSFP_NODETAIL 0x004 /* no p0f details */ 281 #define PF_OSFP_LEN 32 282 char fp_class_nm[PF_OSFP_LEN]; 283 char fp_version_nm[PF_OSFP_LEN]; 284 char fp_subtype_nm[PF_OSFP_LEN]; 285 }; 286 #define PF_OSFP_ENTRY_EQ(a, b) \ 287 ((a)->fp_os == (b)->fp_os && \ 288 memcmp((a)->fp_class_nm, (b)->fp_class_nm, PF_OSFP_LEN) == 0 && \ 289 memcmp((a)->fp_version_nm, (b)->fp_version_nm, PF_OSFP_LEN) == 0 && \ 290 memcmp((a)->fp_subtype_nm, (b)->fp_subtype_nm, PF_OSFP_LEN) == 0) 291 292 /* handle pf_osfp_t packing */ 293 #define _FP_RESERVED_BIT 1 /* For the special negative #defines */ 294 #define _FP_UNUSED_BITS 1 295 #define _FP_CLASS_BITS 10 /* OS Class (Windows, Linux) */ 296 #define _FP_VERSION_BITS 10 /* OS version (95, 98, NT, 2.4.54, 3.2) */ 297 #define _FP_SUBTYPE_BITS 10 /* patch level (NT SP4, SP3, ECN patch) */ 298 #define PF_OSFP_UNPACK(osfp, class, version, subtype) do { \ 299 (class) = ((osfp) >> (_FP_VERSION_BITS+_FP_SUBTYPE_BITS)) & \ 300 ((1 << _FP_CLASS_BITS) - 1); \ 301 (version) = ((osfp) >> _FP_SUBTYPE_BITS) & \ 302 ((1 << _FP_VERSION_BITS) - 1);\ 303 (subtype) = (osfp) & ((1 << _FP_SUBTYPE_BITS) - 1); \ 304 } while(0) 305 #define PF_OSFP_PACK(osfp, class, version, subtype) do { \ 306 (osfp) = ((class) & ((1 << _FP_CLASS_BITS) - 1)) << (_FP_VERSION_BITS \ 307 + _FP_SUBTYPE_BITS); \ 308 (osfp) |= ((version) & ((1 << _FP_VERSION_BITS) - 1)) << \ 309 _FP_SUBTYPE_BITS; \ 310 (osfp) |= (subtype) & ((1 << _FP_SUBTYPE_BITS) - 1); \ 311 } while(0) 312 313 /* the fingerprint of an OSes TCP SYN packet */ 314 typedef u_int64_t pf_tcpopts_t; 315 struct pf_os_fingerprint { 316 SLIST_HEAD(pf_osfp_enlist, pf_osfp_entry) fp_oses; /* list of matches */ 317 pf_tcpopts_t fp_tcpopts; /* packed TCP options */ 318 u_int16_t fp_wsize; /* TCP window size */ 319 u_int16_t fp_psize; /* ip->ip_len */ 320 u_int16_t fp_mss; /* TCP MSS */ 321 u_int16_t fp_flags; 322 #define PF_OSFP_WSIZE_MOD 0x0001 /* Window modulus */ 323 #define PF_OSFP_WSIZE_DC 0x0002 /* Window don't care */ 324 #define PF_OSFP_WSIZE_MSS 0x0004 /* Window multiple of MSS */ 325 #define PF_OSFP_WSIZE_MTU 0x0008 /* Window multiple of MTU */ 326 #define PF_OSFP_PSIZE_MOD 0x0010 /* packet size modulus */ 327 #define PF_OSFP_PSIZE_DC 0x0020 /* packet size don't care */ 328 #define PF_OSFP_WSCALE 0x0040 /* TCP window scaling */ 329 #define PF_OSFP_WSCALE_MOD 0x0080 /* TCP window scale modulus */ 330 #define PF_OSFP_WSCALE_DC 0x0100 /* TCP window scale dont-care */ 331 #define PF_OSFP_MSS 0x0200 /* TCP MSS */ 332 #define PF_OSFP_MSS_MOD 0x0400 /* TCP MSS modulus */ 333 #define PF_OSFP_MSS_DC 0x0800 /* TCP MSS dont-care */ 334 #define PF_OSFP_DF 0x1000 /* IPv4 don't fragment bit */ 335 #define PF_OSFP_TS0 0x2000 /* Zero timestamp */ 336 #define PF_OSFP_INET6 0x4000 /* IPv6 */ 337 u_int8_t fp_optcnt; /* TCP option count */ 338 u_int8_t fp_wscale; /* TCP window scaling */ 339 u_int8_t fp_ttl; /* IPv4 TTL */ 340 #define PF_OSFP_MAXTTL_OFFSET 40 341 /* TCP options packing */ 342 #define PF_OSFP_TCPOPT_NOP 0x0 /* TCP NOP option */ 343 #define PF_OSFP_TCPOPT_WSCALE 0x1 /* TCP window scaling option */ 344 #define PF_OSFP_TCPOPT_MSS 0x2 /* TCP max segment size opt */ 345 #define PF_OSFP_TCPOPT_SACK 0x3 /* TCP SACK OK option */ 346 #define PF_OSFP_TCPOPT_TS 0x4 /* TCP timestamp option */ 347 #define PF_OSFP_TCPOPT_BITS 3 /* bits used by each option */ 348 #define PF_OSFP_MAX_OPTS \ 349 (sizeof(((struct pf_os_fingerprint *)0)->fp_tcpopts) * 8) \ 350 / PF_OSFP_TCPOPT_BITS 351 352 SLIST_ENTRY(pf_os_fingerprint) fp_next; 353 }; 354 355 struct pf_osfp_ioctl { 356 struct pf_osfp_entry fp_os; 357 pf_tcpopts_t fp_tcpopts; /* packed TCP options */ 358 u_int16_t fp_wsize; /* TCP window size */ 359 u_int16_t fp_psize; /* ip->ip_len */ 360 u_int16_t fp_mss; /* TCP MSS */ 361 u_int16_t fp_flags; 362 u_int8_t fp_optcnt; /* TCP option count */ 363 u_int8_t fp_wscale; /* TCP window scaling */ 364 u_int8_t fp_ttl; /* IPv4 TTL */ 365 366 int fp_getnum; /* DIOCOSFPGET number */ 367 }; 368 369 370 union pf_rule_ptr { 371 struct pf_rule *ptr; 372 u_int32_t nr; 373 }; 374 375 #define PF_ANCHOR_NAME_SIZE 64 376 377 struct pf_rule { 378 struct pf_rule_addr src; 379 struct pf_rule_addr dst; 380 #define PF_SKIP_IFP 0 381 #define PF_SKIP_DIR 1 382 #define PF_SKIP_AF 2 383 #define PF_SKIP_PROTO 3 384 #define PF_SKIP_SRC_ADDR 4 385 #define PF_SKIP_SRC_PORT 5 386 #define PF_SKIP_DST_ADDR 6 387 #define PF_SKIP_DST_PORT 7 388 #define PF_SKIP_COUNT 8 389 union pf_rule_ptr skip[PF_SKIP_COUNT]; 390 #define PF_RULE_LABEL_SIZE 64 391 char label[PF_RULE_LABEL_SIZE]; 392 char ifname[IFNAMSIZ]; 393 char qname[PF_QNAME_SIZE]; 394 char pqname[PF_QNAME_SIZE]; 395 #define PF_TAG_NAME_SIZE 64 396 char tagname[PF_TAG_NAME_SIZE]; 397 char match_tagname[PF_TAG_NAME_SIZE]; 398 399 char overload_tblname[PF_TABLE_NAME_SIZE]; 400 401 TAILQ_ENTRY(pf_rule) entries; 402 struct pf_pool rpool; 403 404 u_int64_t evaluations; 405 u_int64_t packets[2]; 406 u_int64_t bytes[2]; 407 408 struct pfi_kif *kif; 409 struct pf_anchor *anchor; 410 struct pfr_ktable *overload_tbl; 411 412 pf_osfp_t os_fingerprint; 413 414 int rtableid; 415 u_int32_t timeout[PFTM_MAX]; 416 u_int32_t max_states; 417 u_int32_t max_src_nodes; 418 u_int32_t max_src_states; 419 u_int32_t max_src_conn; 420 struct { 421 u_int32_t limit; 422 u_int32_t seconds; 423 } max_src_conn_rate; 424 u_int32_t qid; 425 u_int32_t pqid; 426 u_int32_t rt_listid; 427 u_int32_t nr; 428 u_int32_t prob; 429 uid_t cuid; 430 pid_t cpid; 431 432 counter_u64_t states_cur; 433 counter_u64_t states_tot; 434 counter_u64_t src_nodes; 435 436 u_int16_t return_icmp; 437 u_int16_t return_icmp6; 438 u_int16_t max_mss; 439 u_int16_t tag; 440 u_int16_t match_tag; 441 u_int16_t scrub_flags; 442 443 struct pf_rule_uid uid; 444 struct pf_rule_gid gid; 445 446 u_int32_t rule_flag; 447 u_int8_t action; 448 u_int8_t direction; 449 u_int8_t log; 450 u_int8_t logif; 451 u_int8_t quick; 452 u_int8_t ifnot; 453 u_int8_t match_tag_not; 454 u_int8_t natpass; 455 456 #define PF_STATE_NORMAL 0x1 457 #define PF_STATE_MODULATE 0x2 458 #define PF_STATE_SYNPROXY 0x3 459 u_int8_t keep_state; 460 sa_family_t af; 461 u_int8_t proto; 462 u_int8_t type; 463 u_int8_t code; 464 u_int8_t flags; 465 u_int8_t flagset; 466 u_int8_t min_ttl; 467 u_int8_t allow_opts; 468 u_int8_t rt; 469 u_int8_t return_ttl; 470 u_int8_t tos; 471 u_int8_t set_tos; 472 u_int8_t anchor_relative; 473 u_int8_t anchor_wildcard; 474 475 #define PF_FLUSH 0x01 476 #define PF_FLUSH_GLOBAL 0x02 477 u_int8_t flush; 478 #define PF_PRIO_ZERO 0xff /* match "prio 0" packets */ 479 #define PF_PRIO_MAX 7 480 u_int8_t prio; 481 u_int8_t set_prio[2]; 482 483 struct { 484 struct pf_addr addr; 485 u_int16_t port; 486 } divert; 487 488 uint64_t u_states_cur; 489 uint64_t u_states_tot; 490 uint64_t u_src_nodes; 491 }; 492 493 /* rule flags */ 494 #define PFRULE_DROP 0x0000 495 #define PFRULE_RETURNRST 0x0001 496 #define PFRULE_FRAGMENT 0x0002 497 #define PFRULE_RETURNICMP 0x0004 498 #define PFRULE_RETURN 0x0008 499 #define PFRULE_NOSYNC 0x0010 500 #define PFRULE_SRCTRACK 0x0020 /* track source states */ 501 #define PFRULE_RULESRCTRACK 0x0040 /* per rule */ 502 #define PFRULE_REFS 0x0080 /* rule has references */ 503 504 /* scrub flags */ 505 #define PFRULE_NODF 0x0100 506 #define PFRULE_RANDOMID 0x0800 507 #define PFRULE_REASSEMBLE_TCP 0x1000 508 #define PFRULE_SET_TOS 0x2000 509 510 /* rule flags again */ 511 #define PFRULE_IFBOUND 0x00010000 /* if-bound */ 512 #define PFRULE_STATESLOPPY 0x00020000 /* sloppy state tracking */ 513 514 #define PFSTATE_HIWAT 10000 /* default state table size */ 515 #define PFSTATE_ADAPT_START 6000 /* default adaptive timeout start */ 516 #define PFSTATE_ADAPT_END 12000 /* default adaptive timeout end */ 517 518 519 struct pf_threshold { 520 u_int32_t limit; 521 #define PF_THRESHOLD_MULT 1000 522 #define PF_THRESHOLD_MAX 0xffffffff / PF_THRESHOLD_MULT 523 u_int32_t seconds; 524 u_int32_t count; 525 u_int32_t last; 526 }; 527 528 struct pf_src_node { 529 LIST_ENTRY(pf_src_node) entry; 530 struct pf_addr addr; 531 struct pf_addr raddr; 532 union pf_rule_ptr rule; 533 struct pfi_kif *kif; 534 u_int64_t bytes[2]; 535 u_int64_t packets[2]; 536 u_int32_t states; 537 u_int32_t conn; 538 struct pf_threshold conn_rate; 539 u_int32_t creation; 540 u_int32_t expire; 541 sa_family_t af; 542 u_int8_t ruletype; 543 }; 544 545 #define PFSNODE_HIWAT 10000 /* default source node table size */ 546 547 struct pf_state_scrub { 548 struct timeval pfss_last; /* time received last packet */ 549 u_int32_t pfss_tsecr; /* last echoed timestamp */ 550 u_int32_t pfss_tsval; /* largest timestamp */ 551 u_int32_t pfss_tsval0; /* original timestamp */ 552 u_int16_t pfss_flags; 553 #define PFSS_TIMESTAMP 0x0001 /* modulate timestamp */ 554 #define PFSS_PAWS 0x0010 /* stricter PAWS checks */ 555 #define PFSS_PAWS_IDLED 0x0020 /* was idle too long. no PAWS */ 556 #define PFSS_DATA_TS 0x0040 /* timestamp on data packets */ 557 #define PFSS_DATA_NOTS 0x0080 /* no timestamp on data packets */ 558 u_int8_t pfss_ttl; /* stashed TTL */ 559 u_int8_t pad; 560 u_int32_t pfss_ts_mod; /* timestamp modulation */ 561 }; 562 563 struct pf_state_host { 564 struct pf_addr addr; 565 u_int16_t port; 566 u_int16_t pad; 567 }; 568 569 struct pf_state_peer { 570 struct pf_state_scrub *scrub; /* state is scrubbed */ 571 u_int32_t seqlo; /* Max sequence number sent */ 572 u_int32_t seqhi; /* Max the other end ACKd + win */ 573 u_int32_t seqdiff; /* Sequence number modulator */ 574 u_int16_t max_win; /* largest window (pre scaling) */ 575 u_int16_t mss; /* Maximum segment size option */ 576 u_int8_t state; /* active state level */ 577 u_int8_t wscale; /* window scaling factor */ 578 u_int8_t tcp_est; /* Did we reach TCPS_ESTABLISHED */ 579 u_int8_t pad[1]; 580 }; 581 582 /* Keep synced with struct pf_state_key. */ 583 struct pf_state_key_cmp { 584 struct pf_addr addr[2]; 585 u_int16_t port[2]; 586 sa_family_t af; 587 u_int8_t proto; 588 u_int8_t pad[2]; 589 }; 590 591 struct pf_state_key { 592 struct pf_addr addr[2]; 593 u_int16_t port[2]; 594 sa_family_t af; 595 u_int8_t proto; 596 u_int8_t pad[2]; 597 598 LIST_ENTRY(pf_state_key) entry; 599 TAILQ_HEAD(, pf_state) states[2]; 600 }; 601 602 /* Keep synced with struct pf_state. */ 603 struct pf_state_cmp { 604 u_int64_t id; 605 u_int32_t creatorid; 606 u_int8_t direction; 607 u_int8_t pad[3]; 608 }; 609 610 struct pf_state { 611 u_int64_t id; 612 u_int32_t creatorid; 613 u_int8_t direction; 614 u_int8_t pad[3]; 615 616 u_int refs; 617 TAILQ_ENTRY(pf_state) sync_list; 618 TAILQ_ENTRY(pf_state) key_list[2]; 619 LIST_ENTRY(pf_state) entry; 620 struct pf_state_peer src; 621 struct pf_state_peer dst; 622 union pf_rule_ptr rule; 623 union pf_rule_ptr anchor; 624 union pf_rule_ptr nat_rule; 625 struct pf_addr rt_addr; 626 struct pf_state_key *key[2]; /* addresses stack and wire */ 627 struct pfi_kif *kif; 628 struct pfi_kif *rt_kif; 629 struct pf_src_node *src_node; 630 struct pf_src_node *nat_src_node; 631 u_int64_t packets[2]; 632 u_int64_t bytes[2]; 633 u_int32_t creation; 634 u_int32_t expire; 635 u_int32_t pfsync_time; 636 u_int16_t tag; 637 u_int8_t log; 638 u_int8_t state_flags; 639 #define PFSTATE_ALLOWOPTS 0x01 640 #define PFSTATE_SLOPPY 0x02 641 /* was PFSTATE_PFLOW 0x04 */ 642 #define PFSTATE_NOSYNC 0x08 643 #define PFSTATE_ACK 0x10 644 #define PFSTATE_SETPRIO 0x0200 645 #define PFSTATE_SETMASK (PFSTATE_SETPRIO) 646 u_int8_t timeout; 647 u_int8_t sync_state; /* PFSYNC_S_x */ 648 649 /* XXX */ 650 u_int8_t sync_updates; 651 u_int8_t _tail[3]; 652 }; 653 654 /* 655 * Unified state structures for pulling states out of the kernel 656 * used by pfsync(4) and the pf(4) ioctl. 657 */ 658 struct pfsync_state_scrub { 659 u_int16_t pfss_flags; 660 u_int8_t pfss_ttl; /* stashed TTL */ 661 #define PFSYNC_SCRUB_FLAG_VALID 0x01 662 u_int8_t scrub_flag; 663 u_int32_t pfss_ts_mod; /* timestamp modulation */ 664 } __packed; 665 666 struct pfsync_state_peer { 667 struct pfsync_state_scrub scrub; /* state is scrubbed */ 668 u_int32_t seqlo; /* Max sequence number sent */ 669 u_int32_t seqhi; /* Max the other end ACKd + win */ 670 u_int32_t seqdiff; /* Sequence number modulator */ 671 u_int16_t max_win; /* largest window (pre scaling) */ 672 u_int16_t mss; /* Maximum segment size option */ 673 u_int8_t state; /* active state level */ 674 u_int8_t wscale; /* window scaling factor */ 675 u_int8_t pad[6]; 676 } __packed; 677 678 struct pfsync_state_key { 679 struct pf_addr addr[2]; 680 u_int16_t port[2]; 681 }; 682 683 struct pfsync_state { 684 u_int64_t id; 685 char ifname[IFNAMSIZ]; 686 struct pfsync_state_key key[2]; 687 struct pfsync_state_peer src; 688 struct pfsync_state_peer dst; 689 struct pf_addr rt_addr; 690 u_int32_t rule; 691 u_int32_t anchor; 692 u_int32_t nat_rule; 693 u_int32_t creation; 694 u_int32_t expire; 695 u_int32_t packets[2][2]; 696 u_int32_t bytes[2][2]; 697 u_int32_t creatorid; 698 sa_family_t af; 699 u_int8_t proto; 700 u_int8_t direction; 701 u_int8_t __spare[2]; 702 u_int8_t log; 703 u_int8_t state_flags; 704 u_int8_t timeout; 705 u_int8_t sync_flags; 706 u_int8_t updates; 707 } __packed; 708 709 #define PFSYNC_FLAG_SRCNODE 0x04 710 #define PFSYNC_FLAG_NATSRCNODE 0x08 711 712 /* for copies to/from network byte order */ 713 /* ioctl interface also uses network byte order */ 714 #define pf_state_peer_hton(s,d) do { \ 715 (d)->seqlo = htonl((s)->seqlo); \ 716 (d)->seqhi = htonl((s)->seqhi); \ 717 (d)->seqdiff = htonl((s)->seqdiff); \ 718 (d)->max_win = htons((s)->max_win); \ 719 (d)->mss = htons((s)->mss); \ 720 (d)->state = (s)->state; \ 721 (d)->wscale = (s)->wscale; \ 722 if ((s)->scrub) { \ 723 (d)->scrub.pfss_flags = \ 724 htons((s)->scrub->pfss_flags & PFSS_TIMESTAMP); \ 725 (d)->scrub.pfss_ttl = (s)->scrub->pfss_ttl; \ 726 (d)->scrub.pfss_ts_mod = htonl((s)->scrub->pfss_ts_mod);\ 727 (d)->scrub.scrub_flag = PFSYNC_SCRUB_FLAG_VALID; \ 728 } \ 729 } while (0) 730 731 #define pf_state_peer_ntoh(s,d) do { \ 732 (d)->seqlo = ntohl((s)->seqlo); \ 733 (d)->seqhi = ntohl((s)->seqhi); \ 734 (d)->seqdiff = ntohl((s)->seqdiff); \ 735 (d)->max_win = ntohs((s)->max_win); \ 736 (d)->mss = ntohs((s)->mss); \ 737 (d)->state = (s)->state; \ 738 (d)->wscale = (s)->wscale; \ 739 if ((s)->scrub.scrub_flag == PFSYNC_SCRUB_FLAG_VALID && \ 740 (d)->scrub != NULL) { \ 741 (d)->scrub->pfss_flags = \ 742 ntohs((s)->scrub.pfss_flags) & PFSS_TIMESTAMP; \ 743 (d)->scrub->pfss_ttl = (s)->scrub.pfss_ttl; \ 744 (d)->scrub->pfss_ts_mod = ntohl((s)->scrub.pfss_ts_mod);\ 745 } \ 746 } while (0) 747 748 #define pf_state_counter_hton(s,d) do { \ 749 d[0] = htonl((s>>32)&0xffffffff); \ 750 d[1] = htonl(s&0xffffffff); \ 751 } while (0) 752 753 #define pf_state_counter_from_pfsync(s) \ 754 (((u_int64_t)(s[0])<<32) | (u_int64_t)(s[1])) 755 756 #define pf_state_counter_ntoh(s,d) do { \ 757 d = ntohl(s[0]); \ 758 d = d<<32; \ 759 d += ntohl(s[1]); \ 760 } while (0) 761 762 TAILQ_HEAD(pf_rulequeue, pf_rule); 763 764 struct pf_anchor; 765 766 struct pf_ruleset { 767 struct { 768 struct pf_rulequeue queues[2]; 769 struct { 770 struct pf_rulequeue *ptr; 771 struct pf_rule **ptr_array; 772 u_int32_t rcount; 773 u_int32_t ticket; 774 int open; 775 } active, inactive; 776 } rules[PF_RULESET_MAX]; 777 struct pf_anchor *anchor; 778 u_int32_t tticket; 779 int tables; 780 int topen; 781 }; 782 783 RB_HEAD(pf_anchor_global, pf_anchor); 784 RB_HEAD(pf_anchor_node, pf_anchor); 785 struct pf_anchor { 786 RB_ENTRY(pf_anchor) entry_global; 787 RB_ENTRY(pf_anchor) entry_node; 788 struct pf_anchor *parent; 789 struct pf_anchor_node children; 790 char name[PF_ANCHOR_NAME_SIZE]; 791 char path[MAXPATHLEN]; 792 struct pf_ruleset ruleset; 793 int refcnt; /* anchor rules */ 794 int match; /* XXX: used for pfctl black magic */ 795 }; 796 RB_PROTOTYPE(pf_anchor_global, pf_anchor, entry_global, pf_anchor_compare); 797 RB_PROTOTYPE(pf_anchor_node, pf_anchor, entry_node, pf_anchor_compare); 798 799 #define PF_RESERVED_ANCHOR "_pf" 800 801 #define PFR_TFLAG_PERSIST 0x00000001 802 #define PFR_TFLAG_CONST 0x00000002 803 #define PFR_TFLAG_ACTIVE 0x00000004 804 #define PFR_TFLAG_INACTIVE 0x00000008 805 #define PFR_TFLAG_REFERENCED 0x00000010 806 #define PFR_TFLAG_REFDANCHOR 0x00000020 807 #define PFR_TFLAG_COUNTERS 0x00000040 808 /* Adjust masks below when adding flags. */ 809 #define PFR_TFLAG_USRMASK (PFR_TFLAG_PERSIST | \ 810 PFR_TFLAG_CONST | \ 811 PFR_TFLAG_COUNTERS) 812 #define PFR_TFLAG_SETMASK (PFR_TFLAG_ACTIVE | \ 813 PFR_TFLAG_INACTIVE | \ 814 PFR_TFLAG_REFERENCED | \ 815 PFR_TFLAG_REFDANCHOR) 816 #define PFR_TFLAG_ALLMASK (PFR_TFLAG_PERSIST | \ 817 PFR_TFLAG_CONST | \ 818 PFR_TFLAG_ACTIVE | \ 819 PFR_TFLAG_INACTIVE | \ 820 PFR_TFLAG_REFERENCED | \ 821 PFR_TFLAG_REFDANCHOR | \ 822 PFR_TFLAG_COUNTERS) 823 824 struct pf_anchor_stackframe; 825 826 struct pfr_table { 827 char pfrt_anchor[MAXPATHLEN]; 828 char pfrt_name[PF_TABLE_NAME_SIZE]; 829 u_int32_t pfrt_flags; 830 u_int8_t pfrt_fback; 831 }; 832 833 enum { PFR_FB_NONE, PFR_FB_MATCH, PFR_FB_ADDED, PFR_FB_DELETED, 834 PFR_FB_CHANGED, PFR_FB_CLEARED, PFR_FB_DUPLICATE, 835 PFR_FB_NOTMATCH, PFR_FB_CONFLICT, PFR_FB_NOCOUNT, PFR_FB_MAX }; 836 837 struct pfr_addr { 838 union { 839 struct in_addr _pfra_ip4addr; 840 struct in6_addr _pfra_ip6addr; 841 } pfra_u; 842 u_int8_t pfra_af; 843 u_int8_t pfra_net; 844 u_int8_t pfra_not; 845 u_int8_t pfra_fback; 846 }; 847 #define pfra_ip4addr pfra_u._pfra_ip4addr 848 #define pfra_ip6addr pfra_u._pfra_ip6addr 849 850 enum { PFR_DIR_IN, PFR_DIR_OUT, PFR_DIR_MAX }; 851 enum { PFR_OP_BLOCK, PFR_OP_PASS, PFR_OP_ADDR_MAX, PFR_OP_TABLE_MAX }; 852 #define PFR_OP_XPASS PFR_OP_ADDR_MAX 853 854 struct pfr_astats { 855 struct pfr_addr pfras_a; 856 u_int64_t pfras_packets[PFR_DIR_MAX][PFR_OP_ADDR_MAX]; 857 u_int64_t pfras_bytes[PFR_DIR_MAX][PFR_OP_ADDR_MAX]; 858 long pfras_tzero; 859 }; 860 861 enum { PFR_REFCNT_RULE, PFR_REFCNT_ANCHOR, PFR_REFCNT_MAX }; 862 863 struct pfr_tstats { 864 struct pfr_table pfrts_t; 865 u_int64_t pfrts_packets[PFR_DIR_MAX][PFR_OP_TABLE_MAX]; 866 u_int64_t pfrts_bytes[PFR_DIR_MAX][PFR_OP_TABLE_MAX]; 867 u_int64_t pfrts_match; 868 u_int64_t pfrts_nomatch; 869 long pfrts_tzero; 870 int pfrts_cnt; 871 int pfrts_refcnt[PFR_REFCNT_MAX]; 872 }; 873 #define pfrts_name pfrts_t.pfrt_name 874 #define pfrts_flags pfrts_t.pfrt_flags 875 876 #ifndef _SOCKADDR_UNION_DEFINED 877 #define _SOCKADDR_UNION_DEFINED 878 union sockaddr_union { 879 struct sockaddr sa; 880 struct sockaddr_in sin; 881 struct sockaddr_in6 sin6; 882 }; 883 #endif /* _SOCKADDR_UNION_DEFINED */ 884 885 struct pfr_kcounters { 886 u_int64_t pfrkc_packets[PFR_DIR_MAX][PFR_OP_ADDR_MAX]; 887 u_int64_t pfrkc_bytes[PFR_DIR_MAX][PFR_OP_ADDR_MAX]; 888 }; 889 890 SLIST_HEAD(pfr_kentryworkq, pfr_kentry); 891 struct pfr_kentry { 892 struct radix_node pfrke_node[2]; 893 union sockaddr_union pfrke_sa; 894 SLIST_ENTRY(pfr_kentry) pfrke_workq; 895 struct pfr_kcounters *pfrke_counters; 896 long pfrke_tzero; 897 u_int8_t pfrke_af; 898 u_int8_t pfrke_net; 899 u_int8_t pfrke_not; 900 u_int8_t pfrke_mark; 901 }; 902 903 SLIST_HEAD(pfr_ktableworkq, pfr_ktable); 904 RB_HEAD(pfr_ktablehead, pfr_ktable); 905 struct pfr_ktable { 906 struct pfr_tstats pfrkt_ts; 907 RB_ENTRY(pfr_ktable) pfrkt_tree; 908 SLIST_ENTRY(pfr_ktable) pfrkt_workq; 909 struct radix_node_head *pfrkt_ip4; 910 struct radix_node_head *pfrkt_ip6; 911 struct pfr_ktable *pfrkt_shadow; 912 struct pfr_ktable *pfrkt_root; 913 struct pf_ruleset *pfrkt_rs; 914 long pfrkt_larg; 915 int pfrkt_nflags; 916 }; 917 #define pfrkt_t pfrkt_ts.pfrts_t 918 #define pfrkt_name pfrkt_t.pfrt_name 919 #define pfrkt_anchor pfrkt_t.pfrt_anchor 920 #define pfrkt_ruleset pfrkt_t.pfrt_ruleset 921 #define pfrkt_flags pfrkt_t.pfrt_flags 922 #define pfrkt_cnt pfrkt_ts.pfrts_cnt 923 #define pfrkt_refcnt pfrkt_ts.pfrts_refcnt 924 #define pfrkt_packets pfrkt_ts.pfrts_packets 925 #define pfrkt_bytes pfrkt_ts.pfrts_bytes 926 #define pfrkt_match pfrkt_ts.pfrts_match 927 #define pfrkt_nomatch pfrkt_ts.pfrts_nomatch 928 #define pfrkt_tzero pfrkt_ts.pfrts_tzero 929 930 /* keep synced with pfi_kif, used in RB_FIND */ 931 struct pfi_kif_cmp { 932 char pfik_name[IFNAMSIZ]; 933 }; 934 935 struct pfi_kif { 936 char pfik_name[IFNAMSIZ]; 937 union { 938 RB_ENTRY(pfi_kif) _pfik_tree; 939 LIST_ENTRY(pfi_kif) _pfik_list; 940 } _pfik_glue; 941 #define pfik_tree _pfik_glue._pfik_tree 942 #define pfik_list _pfik_glue._pfik_list 943 u_int64_t pfik_packets[2][2][2]; 944 u_int64_t pfik_bytes[2][2][2]; 945 u_int32_t pfik_tzero; 946 u_int pfik_flags; 947 struct ifnet *pfik_ifp; 948 struct ifg_group *pfik_group; 949 u_int pfik_rulerefs; 950 TAILQ_HEAD(, pfi_dynaddr) pfik_dynaddrs; 951 }; 952 953 #define PFI_IFLAG_REFS 0x0001 /* has state references */ 954 #define PFI_IFLAG_SKIP 0x0100 /* skip filtering on interface */ 955 956 struct pf_pdesc { 957 struct { 958 int done; 959 uid_t uid; 960 gid_t gid; 961 } lookup; 962 u_int64_t tot_len; /* Make Mickey money */ 963 union { 964 struct tcphdr *tcp; 965 struct udphdr *udp; 966 struct icmp *icmp; 967 #ifdef INET6 968 struct icmp6_hdr *icmp6; 969 #endif /* INET6 */ 970 void *any; 971 } hdr; 972 973 struct pf_rule *nat_rule; /* nat/rdr rule applied to packet */ 974 struct pf_addr *src; /* src address */ 975 struct pf_addr *dst; /* dst address */ 976 u_int16_t *sport; 977 u_int16_t *dport; 978 struct pf_mtag *pf_mtag; 979 980 u_int32_t p_len; /* total length of payload */ 981 982 u_int16_t *ip_sum; 983 u_int16_t *proto_sum; 984 u_int16_t flags; /* Let SCRUB trigger behavior in 985 * state code. Easier than tags */ 986 #define PFDESC_TCP_NORM 0x0001 /* TCP shall be statefully scrubbed */ 987 #define PFDESC_IP_REAS 0x0002 /* IP frags would've been reassembled */ 988 sa_family_t af; 989 u_int8_t proto; 990 u_int8_t tos; 991 u_int8_t dir; /* direction */ 992 u_int8_t sidx; /* key index for source */ 993 u_int8_t didx; /* key index for destination */ 994 }; 995 996 /* flags for RDR options */ 997 #define PF_DPORT_RANGE 0x01 /* Dest port uses range */ 998 #define PF_RPORT_RANGE 0x02 /* RDR'ed port uses range */ 999 1000 /* UDP state enumeration */ 1001 #define PFUDPS_NO_TRAFFIC 0 1002 #define PFUDPS_SINGLE 1 1003 #define PFUDPS_MULTIPLE 2 1004 1005 #define PFUDPS_NSTATES 3 /* number of state levels */ 1006 1007 #define PFUDPS_NAMES { \ 1008 "NO_TRAFFIC", \ 1009 "SINGLE", \ 1010 "MULTIPLE", \ 1011 NULL \ 1012 } 1013 1014 /* Other protocol state enumeration */ 1015 #define PFOTHERS_NO_TRAFFIC 0 1016 #define PFOTHERS_SINGLE 1 1017 #define PFOTHERS_MULTIPLE 2 1018 1019 #define PFOTHERS_NSTATES 3 /* number of state levels */ 1020 1021 #define PFOTHERS_NAMES { \ 1022 "NO_TRAFFIC", \ 1023 "SINGLE", \ 1024 "MULTIPLE", \ 1025 NULL \ 1026 } 1027 1028 #define ACTION_SET(a, x) \ 1029 do { \ 1030 if ((a) != NULL) \ 1031 *(a) = (x); \ 1032 } while (0) 1033 1034 #define REASON_SET(a, x) \ 1035 do { \ 1036 if ((a) != NULL) \ 1037 *(a) = (x); \ 1038 if (x < PFRES_MAX) \ 1039 counter_u64_add(V_pf_status.counters[x], 1); \ 1040 } while (0) 1041 1042 struct pf_kstatus { 1043 counter_u64_t counters[PFRES_MAX]; /* reason for passing/dropping */ 1044 counter_u64_t lcounters[LCNT_MAX]; /* limit counters */ 1045 counter_u64_t fcounters[FCNT_MAX]; /* state operation counters */ 1046 counter_u64_t scounters[SCNT_MAX]; /* src_node operation counters */ 1047 uint32_t states; 1048 uint32_t src_nodes; 1049 uint32_t running; 1050 uint32_t since; 1051 uint32_t debug; 1052 uint32_t hostid; 1053 char ifname[IFNAMSIZ]; 1054 uint8_t pf_chksum[PF_MD5_DIGEST_LENGTH]; 1055 }; 1056 1057 struct pf_divert { 1058 union { 1059 struct in_addr ipv4; 1060 struct in6_addr ipv6; 1061 } addr; 1062 u_int16_t port; 1063 }; 1064 1065 #define PFFRAG_FRENT_HIWAT 5000 /* Number of fragment entries */ 1066 #define PFR_KENTRY_HIWAT 200000 /* Number of table entries */ 1067 1068 /* 1069 * ioctl parameter structures 1070 */ 1071 1072 struct pfioc_pooladdr { 1073 u_int32_t action; 1074 u_int32_t ticket; 1075 u_int32_t nr; 1076 u_int32_t r_num; 1077 u_int8_t r_action; 1078 u_int8_t r_last; 1079 u_int8_t af; 1080 char anchor[MAXPATHLEN]; 1081 struct pf_pooladdr addr; 1082 }; 1083 1084 struct pfioc_rule { 1085 u_int32_t action; 1086 u_int32_t ticket; 1087 u_int32_t pool_ticket; 1088 u_int32_t nr; 1089 char anchor[MAXPATHLEN]; 1090 char anchor_call[MAXPATHLEN]; 1091 struct pf_rule rule; 1092 }; 1093 1094 struct pfioc_natlook { 1095 struct pf_addr saddr; 1096 struct pf_addr daddr; 1097 struct pf_addr rsaddr; 1098 struct pf_addr rdaddr; 1099 u_int16_t sport; 1100 u_int16_t dport; 1101 u_int16_t rsport; 1102 u_int16_t rdport; 1103 sa_family_t af; 1104 u_int8_t proto; 1105 u_int8_t direction; 1106 }; 1107 1108 struct pfioc_state { 1109 struct pfsync_state state; 1110 }; 1111 1112 struct pfioc_src_node_kill { 1113 sa_family_t psnk_af; 1114 struct pf_rule_addr psnk_src; 1115 struct pf_rule_addr psnk_dst; 1116 u_int psnk_killed; 1117 }; 1118 1119 struct pfioc_state_kill { 1120 struct pf_state_cmp psk_pfcmp; 1121 sa_family_t psk_af; 1122 int psk_proto; 1123 struct pf_rule_addr psk_src; 1124 struct pf_rule_addr psk_dst; 1125 char psk_ifname[IFNAMSIZ]; 1126 char psk_label[PF_RULE_LABEL_SIZE]; 1127 u_int psk_killed; 1128 }; 1129 1130 struct pfioc_states { 1131 int ps_len; 1132 union { 1133 caddr_t psu_buf; 1134 struct pfsync_state *psu_states; 1135 } ps_u; 1136 #define ps_buf ps_u.psu_buf 1137 #define ps_states ps_u.psu_states 1138 }; 1139 1140 struct pfioc_src_nodes { 1141 int psn_len; 1142 union { 1143 caddr_t psu_buf; 1144 struct pf_src_node *psu_src_nodes; 1145 } psn_u; 1146 #define psn_buf psn_u.psu_buf 1147 #define psn_src_nodes psn_u.psu_src_nodes 1148 }; 1149 1150 struct pfioc_if { 1151 char ifname[IFNAMSIZ]; 1152 }; 1153 1154 struct pfioc_tm { 1155 int timeout; 1156 int seconds; 1157 }; 1158 1159 struct pfioc_limit { 1160 int index; 1161 unsigned limit; 1162 }; 1163 1164 struct pfioc_altq { 1165 u_int32_t action; 1166 u_int32_t ticket; 1167 u_int32_t nr; 1168 struct pf_altq altq; 1169 }; 1170 1171 struct pfioc_qstats { 1172 u_int32_t ticket; 1173 u_int32_t nr; 1174 void *buf; 1175 int nbytes; 1176 u_int8_t scheduler; 1177 }; 1178 1179 struct pfioc_ruleset { 1180 u_int32_t nr; 1181 char path[MAXPATHLEN]; 1182 char name[PF_ANCHOR_NAME_SIZE]; 1183 }; 1184 1185 #define PF_RULESET_ALTQ (PF_RULESET_MAX) 1186 #define PF_RULESET_TABLE (PF_RULESET_MAX+1) 1187 struct pfioc_trans { 1188 int size; /* number of elements */ 1189 int esize; /* size of each element in bytes */ 1190 struct pfioc_trans_e { 1191 int rs_num; 1192 char anchor[MAXPATHLEN]; 1193 u_int32_t ticket; 1194 } *array; 1195 }; 1196 1197 #define PFR_FLAG_ATOMIC 0x00000001 /* unused */ 1198 #define PFR_FLAG_DUMMY 0x00000002 1199 #define PFR_FLAG_FEEDBACK 0x00000004 1200 #define PFR_FLAG_CLSTATS 0x00000008 1201 #define PFR_FLAG_ADDRSTOO 0x00000010 1202 #define PFR_FLAG_REPLACE 0x00000020 1203 #define PFR_FLAG_ALLRSETS 0x00000040 1204 #define PFR_FLAG_ALLMASK 0x0000007F 1205 1206 struct pfioc_table { 1207 struct pfr_table pfrio_table; 1208 void *pfrio_buffer; 1209 int pfrio_esize; 1210 int pfrio_size; 1211 int pfrio_size2; 1212 int pfrio_nadd; 1213 int pfrio_ndel; 1214 int pfrio_nchange; 1215 int pfrio_flags; 1216 u_int32_t pfrio_ticket; 1217 }; 1218 #define pfrio_exists pfrio_nadd 1219 #define pfrio_nzero pfrio_nadd 1220 #define pfrio_nmatch pfrio_nadd 1221 #define pfrio_naddr pfrio_size2 1222 #define pfrio_setflag pfrio_size2 1223 #define pfrio_clrflag pfrio_nadd 1224 1225 struct pfioc_iface { 1226 char pfiio_name[IFNAMSIZ]; 1227 void *pfiio_buffer; 1228 int pfiio_esize; 1229 int pfiio_size; 1230 int pfiio_nzero; 1231 int pfiio_flags; 1232 }; 1233 1234 1235 /* 1236 * ioctl operations 1237 */ 1238 1239 #define DIOCSTART _IO ('D', 1) 1240 #define DIOCSTOP _IO ('D', 2) 1241 #define DIOCADDRULE _IOWR('D', 4, struct pfioc_rule) 1242 #define DIOCGETRULES _IOWR('D', 6, struct pfioc_rule) 1243 #define DIOCGETRULE _IOWR('D', 7, struct pfioc_rule) 1244 /* XXX cut 8 - 17 */ 1245 #define DIOCCLRSTATES _IOWR('D', 18, struct pfioc_state_kill) 1246 #define DIOCGETSTATE _IOWR('D', 19, struct pfioc_state) 1247 #define DIOCSETSTATUSIF _IOWR('D', 20, struct pfioc_if) 1248 #define DIOCGETSTATUS _IOWR('D', 21, struct pf_status) 1249 #define DIOCCLRSTATUS _IO ('D', 22) 1250 #define DIOCNATLOOK _IOWR('D', 23, struct pfioc_natlook) 1251 #define DIOCSETDEBUG _IOWR('D', 24, u_int32_t) 1252 #define DIOCGETSTATES _IOWR('D', 25, struct pfioc_states) 1253 #define DIOCCHANGERULE _IOWR('D', 26, struct pfioc_rule) 1254 /* XXX cut 26 - 28 */ 1255 #define DIOCSETTIMEOUT _IOWR('D', 29, struct pfioc_tm) 1256 #define DIOCGETTIMEOUT _IOWR('D', 30, struct pfioc_tm) 1257 #define DIOCADDSTATE _IOWR('D', 37, struct pfioc_state) 1258 #define DIOCCLRRULECTRS _IO ('D', 38) 1259 #define DIOCGETLIMIT _IOWR('D', 39, struct pfioc_limit) 1260 #define DIOCSETLIMIT _IOWR('D', 40, struct pfioc_limit) 1261 #define DIOCKILLSTATES _IOWR('D', 41, struct pfioc_state_kill) 1262 #define DIOCSTARTALTQ _IO ('D', 42) 1263 #define DIOCSTOPALTQ _IO ('D', 43) 1264 #define DIOCADDALTQ _IOWR('D', 45, struct pfioc_altq) 1265 #define DIOCGETALTQS _IOWR('D', 47, struct pfioc_altq) 1266 #define DIOCGETALTQ _IOWR('D', 48, struct pfioc_altq) 1267 #define DIOCCHANGEALTQ _IOWR('D', 49, struct pfioc_altq) 1268 #define DIOCGETQSTATS _IOWR('D', 50, struct pfioc_qstats) 1269 #define DIOCBEGINADDRS _IOWR('D', 51, struct pfioc_pooladdr) 1270 #define DIOCADDADDR _IOWR('D', 52, struct pfioc_pooladdr) 1271 #define DIOCGETADDRS _IOWR('D', 53, struct pfioc_pooladdr) 1272 #define DIOCGETADDR _IOWR('D', 54, struct pfioc_pooladdr) 1273 #define DIOCCHANGEADDR _IOWR('D', 55, struct pfioc_pooladdr) 1274 /* XXX cut 55 - 57 */ 1275 #define DIOCGETRULESETS _IOWR('D', 58, struct pfioc_ruleset) 1276 #define DIOCGETRULESET _IOWR('D', 59, struct pfioc_ruleset) 1277 #define DIOCRCLRTABLES _IOWR('D', 60, struct pfioc_table) 1278 #define DIOCRADDTABLES _IOWR('D', 61, struct pfioc_table) 1279 #define DIOCRDELTABLES _IOWR('D', 62, struct pfioc_table) 1280 #define DIOCRGETTABLES _IOWR('D', 63, struct pfioc_table) 1281 #define DIOCRGETTSTATS _IOWR('D', 64, struct pfioc_table) 1282 #define DIOCRCLRTSTATS _IOWR('D', 65, struct pfioc_table) 1283 #define DIOCRCLRADDRS _IOWR('D', 66, struct pfioc_table) 1284 #define DIOCRADDADDRS _IOWR('D', 67, struct pfioc_table) 1285 #define DIOCRDELADDRS _IOWR('D', 68, struct pfioc_table) 1286 #define DIOCRSETADDRS _IOWR('D', 69, struct pfioc_table) 1287 #define DIOCRGETADDRS _IOWR('D', 70, struct pfioc_table) 1288 #define DIOCRGETASTATS _IOWR('D', 71, struct pfioc_table) 1289 #define DIOCRCLRASTATS _IOWR('D', 72, struct pfioc_table) 1290 #define DIOCRTSTADDRS _IOWR('D', 73, struct pfioc_table) 1291 #define DIOCRSETTFLAGS _IOWR('D', 74, struct pfioc_table) 1292 #define DIOCRINADEFINE _IOWR('D', 77, struct pfioc_table) 1293 #define DIOCOSFPFLUSH _IO('D', 78) 1294 #define DIOCOSFPADD _IOWR('D', 79, struct pf_osfp_ioctl) 1295 #define DIOCOSFPGET _IOWR('D', 80, struct pf_osfp_ioctl) 1296 #define DIOCXBEGIN _IOWR('D', 81, struct pfioc_trans) 1297 #define DIOCXCOMMIT _IOWR('D', 82, struct pfioc_trans) 1298 #define DIOCXROLLBACK _IOWR('D', 83, struct pfioc_trans) 1299 #define DIOCGETSRCNODES _IOWR('D', 84, struct pfioc_src_nodes) 1300 #define DIOCCLRSRCNODES _IO('D', 85) 1301 #define DIOCSETHOSTID _IOWR('D', 86, u_int32_t) 1302 #define DIOCIGETIFACES _IOWR('D', 87, struct pfioc_iface) 1303 #define DIOCSETIFFLAG _IOWR('D', 89, struct pfioc_iface) 1304 #define DIOCCLRIFFLAG _IOWR('D', 90, struct pfioc_iface) 1305 #define DIOCKILLSRCNODES _IOWR('D', 91, struct pfioc_src_node_kill) 1306 struct pf_ifspeed { 1307 char ifname[IFNAMSIZ]; 1308 u_int32_t baudrate; 1309 }; 1310 #define DIOCGIFSPEED _IOWR('D', 92, struct pf_ifspeed) 1311 1312 #endif /* _NET_PFVAR_H_ */ 1313