2017-01-16 12:28:40 +03:00
|
|
|
/* $NetBSD: pfil.h,v 1.33 2017/01/16 09:28:40 ryo Exp $ */
|
1996-09-14 18:40:20 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (c) 1996 Matthew R. Green
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _NET_PFIL_H_
|
|
|
|
#define _NET_PFIL_H_
|
|
|
|
|
|
|
|
#include <sys/queue.h>
|
|
|
|
|
2000-02-17 13:59:32 +03:00
|
|
|
struct mbuf;
|
|
|
|
struct ifnet;
|
2016-12-27 02:21:49 +03:00
|
|
|
struct ifaddr;
|
2000-02-17 13:59:32 +03:00
|
|
|
|
1996-09-14 18:40:20 +04:00
|
|
|
/*
|
|
|
|
* The packet filter hooks are designed for anything to call them to
|
|
|
|
* possibly intercept the packet.
|
|
|
|
*/
|
2013-06-30 01:06:57 +04:00
|
|
|
typedef int (*pfil_func_t)(void *, struct mbuf **, struct ifnet *, int);
|
2016-12-27 02:21:49 +03:00
|
|
|
typedef void (*pfil_ifunc_t)(void *, unsigned long, void *);
|
1996-09-14 18:40:20 +04:00
|
|
|
|
|
|
|
#define PFIL_IN 0x00000001
|
|
|
|
#define PFIL_OUT 0x00000002
|
1996-12-20 11:40:46 +03:00
|
|
|
#define PFIL_ALL (PFIL_IN|PFIL_OUT)
|
2004-06-22 16:50:41 +04:00
|
|
|
#define PFIL_IFADDR 0x00000008
|
2004-07-27 16:22:59 +04:00
|
|
|
#define PFIL_IFNET 0x00000010
|
|
|
|
|
|
|
|
/* events notified by PFIL_IFNET */
|
|
|
|
#define PFIL_IFNET_ATTACH 0
|
|
|
|
#define PFIL_IFNET_DETACH 1
|
1996-09-14 18:40:20 +04:00
|
|
|
|
2000-12-29 00:40:59 +03:00
|
|
|
#define PFIL_TYPE_AF 1 /* key is AF_* type */
|
2016-12-27 02:21:49 +03:00
|
|
|
#define PFIL_TYPE_IFNET 2 /* key is ifnet or ifaddr pointer */
|
2000-12-29 00:40:59 +03:00
|
|
|
|
2013-06-30 01:06:57 +04:00
|
|
|
typedef struct pfil_head pfil_head_t;
|
2000-02-17 13:59:32 +03:00
|
|
|
|
2006-01-05 00:10:09 +03:00
|
|
|
#ifdef _KERNEL
|
|
|
|
|
2017-01-16 12:28:40 +03:00
|
|
|
void pfil_init(void);
|
2013-06-30 01:06:57 +04:00
|
|
|
int pfil_run_hooks(pfil_head_t *, struct mbuf **, struct ifnet *, int);
|
2016-12-27 02:21:49 +03:00
|
|
|
void pfil_run_addrhooks(pfil_head_t *, unsigned long, struct ifaddr *);
|
|
|
|
void pfil_run_ifhooks(pfil_head_t *, unsigned long, struct ifnet *);
|
|
|
|
|
2013-06-30 01:06:57 +04:00
|
|
|
int pfil_add_hook(pfil_func_t, void *, int, pfil_head_t *);
|
|
|
|
int pfil_remove_hook(pfil_func_t, void *, int, pfil_head_t *);
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
|
2016-12-27 02:21:49 +03:00
|
|
|
int pfil_add_ihook(pfil_ifunc_t, void *, int, pfil_head_t *);
|
|
|
|
int pfil_remove_ihook(pfil_ifunc_t, void *, int, pfil_head_t *);
|
|
|
|
|
2013-06-30 01:06:57 +04:00
|
|
|
pfil_head_t * pfil_head_create(int, void *);
|
|
|
|
void pfil_head_destroy(pfil_head_t *);
|
|
|
|
pfil_head_t * pfil_head_get(int, void *);
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
|
2013-06-30 01:06:57 +04:00
|
|
|
/* Packet filtering hook for interfaces (in sys/net/if.c module). */
|
|
|
|
extern pfil_head_t *if_pfil;
|
1996-09-14 18:40:20 +04:00
|
|
|
|
2006-01-05 00:10:09 +03:00
|
|
|
#endif /* _KERNEL */
|
|
|
|
|
2005-12-11 02:21:38 +03:00
|
|
|
#endif /* !_NET_PFIL_H_ */
|