2006-01-05 00:10:09 +03:00
|
|
|
/* $NetBSD: pfil.h,v 1.27 2006/01/04 21:10:09 perry Exp $ */
|
1996-09-14 18:40:20 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (c) 1996 Matthew R. Green
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
1997-10-10 09:39:47 +04:00
|
|
|
* 3. The name of the author may not be used to endorse or promote products
|
1996-09-14 18:40:20 +04:00
|
|
|
* derived from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _NET_PFIL_H_
|
|
|
|
#define _NET_PFIL_H_
|
|
|
|
|
2003-06-23 16:56:07 +04:00
|
|
|
#ifdef _KERNEL_OPT
|
2003-06-23 15:00:59 +04:00
|
|
|
#include "opt_pfil_hooks.h"
|
2003-06-23 16:56:07 +04:00
|
|
|
#endif
|
2003-06-23 15:00:59 +04:00
|
|
|
|
1996-09-14 18:40:20 +04:00
|
|
|
#include <sys/queue.h>
|
2000-12-12 21:03:25 +03:00
|
|
|
#include <net/dlt.h>
|
2001-04-11 18:44:55 +04:00
|
|
|
#include <sys/null.h>
|
1996-09-14 18:40:20 +04:00
|
|
|
|
2000-02-17 13:59:32 +03:00
|
|
|
struct mbuf;
|
|
|
|
struct ifnet;
|
|
|
|
|
1996-09-14 18:40:20 +04:00
|
|
|
/*
|
|
|
|
* The packet filter hooks are designed for anything to call them to
|
|
|
|
* possibly intercept the packet.
|
|
|
|
*/
|
|
|
|
struct packet_filter_hook {
|
1998-03-19 18:45:30 +03:00
|
|
|
TAILQ_ENTRY(packet_filter_hook) pfil_link;
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
int (*pfil_func)(void *, struct mbuf **, struct ifnet *, int);
|
|
|
|
void *pfil_arg;
|
1996-09-14 18:40:20 +04:00
|
|
|
int pfil_flags;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define PFIL_IN 0x00000001
|
|
|
|
#define PFIL_OUT 0x00000002
|
1996-12-20 11:40:46 +03:00
|
|
|
#define PFIL_ALL (PFIL_IN|PFIL_OUT)
|
2004-06-22 16:50:41 +04:00
|
|
|
#define PFIL_WAITOK 0x00000004
|
|
|
|
#define PFIL_IFADDR 0x00000008
|
2004-07-27 16:22:59 +04:00
|
|
|
#define PFIL_IFNET 0x00000010
|
|
|
|
|
|
|
|
/* events notified by PFIL_IFNET */
|
|
|
|
#define PFIL_IFNET_ATTACH 0
|
|
|
|
#define PFIL_IFNET_DETACH 1
|
1996-09-14 18:40:20 +04:00
|
|
|
|
2000-02-17 13:59:32 +03:00
|
|
|
typedef TAILQ_HEAD(pfil_list, packet_filter_hook) pfil_list_t;
|
|
|
|
|
2000-12-29 00:40:59 +03:00
|
|
|
#define PFIL_TYPE_AF 1 /* key is AF_* type */
|
|
|
|
#define PFIL_TYPE_IFNET 2 /* key is ifnet pointer */
|
|
|
|
|
2000-02-17 13:59:32 +03:00
|
|
|
struct pfil_head {
|
|
|
|
pfil_list_t ph_in;
|
|
|
|
pfil_list_t ph_out;
|
2004-06-22 16:50:41 +04:00
|
|
|
pfil_list_t ph_ifaddr;
|
2004-07-27 16:22:59 +04:00
|
|
|
pfil_list_t ph_ifnetevent; /* XXX naming collision */
|
2000-12-29 00:40:59 +03:00
|
|
|
int ph_type;
|
|
|
|
union {
|
|
|
|
u_long phu_val;
|
|
|
|
void *phu_ptr;
|
|
|
|
} ph_un;
|
|
|
|
#define ph_af ph_un.phu_val
|
|
|
|
#define ph_ifnet ph_un.phu_ptr
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
LIST_ENTRY(pfil_head) ph_list;
|
2000-04-19 08:46:23 +04:00
|
|
|
};
|
|
|
|
typedef struct pfil_head pfil_head_t;
|
2000-02-17 13:59:32 +03:00
|
|
|
|
2006-01-05 00:10:09 +03:00
|
|
|
#ifdef _KERNEL
|
|
|
|
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
int pfil_run_hooks(struct pfil_head *, struct mbuf **, struct ifnet *,
|
|
|
|
int);
|
|
|
|
|
|
|
|
int pfil_add_hook(int (*func)(void *, struct mbuf **,
|
|
|
|
struct ifnet *, int), void *, int, struct pfil_head *);
|
|
|
|
int pfil_remove_hook(int (*func)(void *, struct mbuf **,
|
|
|
|
struct ifnet *, int), void *, int, struct pfil_head *);
|
|
|
|
|
|
|
|
int pfil_head_register(struct pfil_head *);
|
|
|
|
int pfil_head_unregister(struct pfil_head *);
|
|
|
|
|
2000-12-29 00:40:59 +03:00
|
|
|
struct pfil_head *pfil_head_get(int, u_long);
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
|
2005-12-24 23:45:08 +03:00
|
|
|
static inline struct packet_filter_hook *
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
pfil_hook_get(int dir, struct pfil_head *ph)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (dir == PFIL_IN)
|
|
|
|
return (TAILQ_FIRST(&ph->ph_in));
|
|
|
|
else if (dir == PFIL_OUT)
|
|
|
|
return (TAILQ_FIRST(&ph->ph_out));
|
2004-06-22 16:50:41 +04:00
|
|
|
else if (dir == PFIL_IFADDR)
|
|
|
|
return (TAILQ_FIRST(&ph->ph_ifaddr));
|
2004-07-27 16:22:59 +04:00
|
|
|
else if (dir == PFIL_IFNET)
|
|
|
|
return (TAILQ_FIRST(&ph->ph_ifnetevent));
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
else
|
|
|
|
return (NULL);
|
|
|
|
}
|
1996-09-14 18:40:20 +04:00
|
|
|
|
2006-01-05 00:10:09 +03:00
|
|
|
#endif /* _KERNEL */
|
|
|
|
|
1997-02-18 23:49:32 +03:00
|
|
|
/* XXX */
|
2001-05-30 15:57:16 +04:00
|
|
|
#if defined(_KERNEL_OPT)
|
1997-02-18 23:49:32 +03:00
|
|
|
#include "ipfilter.h"
|
1997-02-20 02:07:57 +03:00
|
|
|
#endif
|
1997-02-18 23:49:32 +03:00
|
|
|
|
|
|
|
#if NIPFILTER > 0
|
1997-02-22 20:52:44 +03:00
|
|
|
#ifdef PFIL_HOOKS
|
|
|
|
#undef PFIL_HOOKS
|
|
|
|
#endif
|
1997-02-18 23:49:32 +03:00
|
|
|
#define PFIL_HOOKS
|
|
|
|
#endif /* NIPFILTER */
|
|
|
|
|
2004-06-22 16:50:41 +04:00
|
|
|
#ifdef _KERNEL
|
|
|
|
/* in sys/net/if.c */
|
|
|
|
extern struct pfil_head if_pfil; /* packet filtering hook for interfaces */
|
2006-01-05 00:10:09 +03:00
|
|
|
#endif /* _KERNEL */
|
2004-06-22 16:50:41 +04:00
|
|
|
|
2005-12-11 02:21:38 +03:00
|
|
|
#endif /* !_NET_PFIL_H_ */
|