npf_impl.h revision 1.7.6.5 1 1.7.6.5 yamt /* $NetBSD: npf_impl.h,v 1.7.6.5 2013/01/23 00:06:25 yamt Exp $ */
2 1.1 rmind
3 1.1 rmind /*-
4 1.7.6.2 yamt * Copyright (c) 2009-2012 The NetBSD Foundation, Inc.
5 1.1 rmind * All rights reserved.
6 1.1 rmind *
7 1.1 rmind * This material is based upon work partially supported by The
8 1.1 rmind * NetBSD Foundation under a contract with Mindaugas Rasiukevicius.
9 1.1 rmind *
10 1.1 rmind * Redistribution and use in source and binary forms, with or without
11 1.1 rmind * modification, are permitted provided that the following conditions
12 1.1 rmind * are met:
13 1.1 rmind * 1. Redistributions of source code must retain the above copyright
14 1.1 rmind * notice, this list of conditions and the following disclaimer.
15 1.1 rmind * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 rmind * notice, this list of conditions and the following disclaimer in the
17 1.1 rmind * documentation and/or other materials provided with the distribution.
18 1.1 rmind *
19 1.1 rmind * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.1 rmind * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.1 rmind * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.1 rmind * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.1 rmind * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.1 rmind * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.1 rmind * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.1 rmind * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.1 rmind * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.1 rmind * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.1 rmind * POSSIBILITY OF SUCH DAMAGE.
30 1.1 rmind */
31 1.1 rmind
32 1.1 rmind /*
33 1.1 rmind * Private NPF structures and interfaces.
34 1.1 rmind * For internal use within NPF core only.
35 1.1 rmind */
36 1.1 rmind
37 1.1 rmind #ifndef _NPF_IMPL_H_
38 1.1 rmind #define _NPF_IMPL_H_
39 1.1 rmind
40 1.7.6.2 yamt #if !defined(_KERNEL)
41 1.7 rmind #error "Kernel-level header only"
42 1.7 rmind #endif
43 1.7 rmind
44 1.7.6.4 yamt #ifdef _KERNEL_OPT
45 1.7.6.4 yamt /* For INET/INET6 definitions. */
46 1.7.6.4 yamt #include "opt_inet.h"
47 1.7.6.4 yamt #include "opt_inet6.h"
48 1.7.6.4 yamt #endif
49 1.7.6.4 yamt
50 1.4 rmind #include <sys/types.h>
51 1.4 rmind #include <sys/queue.h>
52 1.4 rmind #include <sys/hash.h>
53 1.3 matt #include <sys/rbtree.h>
54 1.7.6.4 yamt #include <sys/ptree.h>
55 1.1 rmind #include <sys/rwlock.h>
56 1.6 rmind #include <net/if.h>
57 1.1 rmind
58 1.1 rmind #include "npf.h"
59 1.1 rmind #include "npf_ncode.h"
60 1.1 rmind
61 1.6 rmind #ifdef _NPF_DEBUG
62 1.6 rmind #define NPF_PRINTF(x) printf x
63 1.6 rmind #else
64 1.6 rmind #define NPF_PRINTF(x)
65 1.6 rmind #endif
66 1.6 rmind
67 1.1 rmind /*
68 1.1 rmind * STRUCTURE DECLARATIONS.
69 1.1 rmind */
70 1.1 rmind
71 1.7 rmind struct npf_ruleset;
72 1.7 rmind struct npf_rule;
73 1.1 rmind struct npf_nat;
74 1.1 rmind struct npf_session;
75 1.1 rmind
76 1.7 rmind typedef struct npf_ruleset npf_ruleset_t;
77 1.7 rmind typedef struct npf_rule npf_rule_t;
78 1.1 rmind typedef struct npf_nat npf_nat_t;
79 1.1 rmind typedef struct npf_alg npf_alg_t;
80 1.1 rmind typedef struct npf_natpolicy npf_natpolicy_t;
81 1.1 rmind typedef struct npf_session npf_session_t;
82 1.1 rmind
83 1.5 rmind struct npf_sehash;
84 1.1 rmind struct npf_table;
85 1.1 rmind
86 1.5 rmind typedef struct npf_sehash npf_sehash_t;
87 1.1 rmind typedef struct npf_table npf_table_t;
88 1.1 rmind
89 1.1 rmind typedef npf_table_t * npf_tableset_t;
90 1.1 rmind
91 1.1 rmind /*
92 1.1 rmind * DEFINITIONS.
93 1.1 rmind */
94 1.1 rmind
95 1.7.6.5 yamt typedef bool (*npf_alg_func_t)(npf_cache_t *, nbuf_t *, npf_nat_t *, int);
96 1.7.6.5 yamt typedef npf_session_t *(*npf_alg_sfunc_t)(npf_cache_t *, nbuf_t *, int);
97 1.1 rmind
98 1.1 rmind #define NPF_NCODE_LIMIT 1024
99 1.1 rmind #define NPF_TABLE_SLOTS 32
100 1.1 rmind
101 1.1 rmind /*
102 1.4 rmind * SESSION STATE STRUCTURES
103 1.4 rmind */
104 1.4 rmind
105 1.7.6.2 yamt #define NPF_FLOW_FORW 0
106 1.7.6.2 yamt #define NPF_FLOW_BACK 1
107 1.7.6.2 yamt
108 1.4 rmind typedef struct {
109 1.7.6.2 yamt uint32_t nst_end;
110 1.7.6.2 yamt uint32_t nst_maxend;
111 1.7.6.2 yamt uint32_t nst_maxwin;
112 1.7.6.2 yamt int nst_wscale;
113 1.4 rmind } npf_tcpstate_t;
114 1.4 rmind
115 1.4 rmind typedef struct {
116 1.4 rmind kmutex_t nst_lock;
117 1.4 rmind int nst_state;
118 1.4 rmind npf_tcpstate_t nst_tcpst[2];
119 1.4 rmind } npf_state_t;
120 1.4 rmind
121 1.4 rmind /*
122 1.1 rmind * INTERFACES.
123 1.1 rmind */
124 1.1 rmind
125 1.5 rmind /* NPF control, statistics, etc. */
126 1.5 rmind void npf_core_enter(void);
127 1.5 rmind npf_ruleset_t * npf_core_ruleset(void);
128 1.5 rmind npf_ruleset_t * npf_core_natset(void);
129 1.5 rmind npf_tableset_t *npf_core_tableset(void);
130 1.5 rmind void npf_core_exit(void);
131 1.5 rmind bool npf_core_locked(void);
132 1.7.6.2 yamt bool npf_default_pass(void);
133 1.7.6.2 yamt prop_dictionary_t npf_core_dict(void);
134 1.7.6.2 yamt
135 1.7.6.2 yamt void npf_reload(prop_dictionary_t, npf_ruleset_t *,
136 1.7.6.2 yamt npf_tableset_t *, npf_ruleset_t *, bool);
137 1.5 rmind
138 1.5 rmind void npflogattach(int);
139 1.5 rmind void npflogdetach(void);
140 1.1 rmind int npfctl_switch(void *);
141 1.1 rmind int npfctl_reload(u_long, void *);
142 1.7.6.2 yamt int npfctl_getconf(u_long, void *);
143 1.5 rmind int npfctl_sessions_save(u_long, void *);
144 1.5 rmind int npfctl_sessions_load(u_long, void *);
145 1.7 rmind int npfctl_update_rule(u_long, void *);
146 1.1 rmind int npfctl_table(void *);
147 1.1 rmind
148 1.5 rmind void npf_stats_inc(npf_stats_t);
149 1.5 rmind void npf_stats_dec(npf_stats_t);
150 1.5 rmind
151 1.1 rmind /* Packet filter hooks. */
152 1.7.6.2 yamt int npf_pfil_register(void);
153 1.7.6.2 yamt void npf_pfil_unregister(void);
154 1.7.6.2 yamt bool npf_pfil_registered_p(void);
155 1.7.6.4 yamt int npf_packet_handler(void *, struct mbuf **, ifnet_t *, int);
156 1.1 rmind
157 1.1 rmind /* Protocol helpers. */
158 1.7.6.2 yamt int npf_cache_all(npf_cache_t *, nbuf_t *);
159 1.7.6.5 yamt void npf_recache(npf_cache_t *, nbuf_t *);
160 1.1 rmind
161 1.7.6.5 yamt bool npf_rwrip(const npf_cache_t *, int, const npf_addr_t *);
162 1.7.6.5 yamt bool npf_rwrport(const npf_cache_t *, int, const in_port_t);
163 1.7.6.5 yamt bool npf_rwrcksum(const npf_cache_t *, const int,
164 1.7.6.5 yamt const npf_addr_t *, const in_port_t);
165 1.1 rmind
166 1.1 rmind uint16_t npf_fixup16_cksum(uint16_t, uint16_t, uint16_t);
167 1.1 rmind uint16_t npf_fixup32_cksum(uint16_t, uint32_t, uint32_t);
168 1.7.6.5 yamt uint16_t npf_addr_cksum(uint16_t, int, const npf_addr_t *,
169 1.7.6.5 yamt const npf_addr_t *);
170 1.4 rmind uint32_t npf_addr_sum(const int, const npf_addr_t *, const npf_addr_t *);
171 1.7.6.4 yamt int npf_addr_cmp(const npf_addr_t *, const npf_netmask_t,
172 1.7.6.4 yamt const npf_addr_t *, const npf_netmask_t, const int);
173 1.7.6.4 yamt void npf_addr_mask(const npf_addr_t *, const npf_netmask_t,
174 1.7.6.4 yamt const int, npf_addr_t *);
175 1.7.6.4 yamt
176 1.7.6.4 yamt int npf_tcpsaw(const npf_cache_t *, tcp_seq *, tcp_seq *,
177 1.7.6.4 yamt uint32_t *);
178 1.7.6.5 yamt bool npf_fetch_tcpopts(npf_cache_t *, nbuf_t *, uint16_t *, int *);
179 1.7.6.3 yamt bool npf_return_block(npf_cache_t *, nbuf_t *, const int);
180 1.2 rmind
181 1.1 rmind /* Complex instructions. */
182 1.7.6.5 yamt int npf_match_ether(nbuf_t *, int, uint16_t, uint32_t *);
183 1.7.6.5 yamt int npf_match_proto(const npf_cache_t *, uint32_t);
184 1.7.6.5 yamt int npf_match_table(const npf_cache_t *, int, u_int);
185 1.7.6.5 yamt int npf_match_ipmask(const npf_cache_t *, int,
186 1.7.6.5 yamt const npf_addr_t *, npf_netmask_t);
187 1.7.6.5 yamt int npf_match_tcp_ports(const npf_cache_t *, int, uint32_t);
188 1.7.6.5 yamt int npf_match_udp_ports(const npf_cache_t *, int, uint32_t);
189 1.7.6.5 yamt int npf_match_icmp4(const npf_cache_t *, uint32_t);
190 1.7.6.5 yamt int npf_match_icmp6(const npf_cache_t *, uint32_t);
191 1.7.6.5 yamt int npf_match_tcpfl(const npf_cache_t *, uint32_t);
192 1.1 rmind
193 1.1 rmind /* Tableset interface. */
194 1.5 rmind void npf_tableset_sysinit(void);
195 1.1 rmind void npf_tableset_sysfini(void);
196 1.1 rmind
197 1.7.6.4 yamt extern const pt_tree_ops_t npf_table_ptree_ops;
198 1.7.6.4 yamt
199 1.1 rmind npf_tableset_t *npf_tableset_create(void);
200 1.1 rmind void npf_tableset_destroy(npf_tableset_t *);
201 1.1 rmind int npf_tableset_insert(npf_tableset_t *, npf_table_t *);
202 1.7.6.4 yamt void npf_tableset_reload(npf_tableset_t *, npf_tableset_t *);
203 1.1 rmind
204 1.1 rmind npf_table_t * npf_table_create(u_int, int, size_t);
205 1.1 rmind void npf_table_destroy(npf_table_t *);
206 1.1 rmind
207 1.7.6.4 yamt int npf_table_check(const npf_tableset_t *, u_int, int);
208 1.7.6.4 yamt int npf_table_insert(npf_tableset_t *, u_int,
209 1.7.6.4 yamt const int, const npf_addr_t *, const npf_netmask_t);
210 1.7.6.4 yamt int npf_table_remove(npf_tableset_t *, u_int,
211 1.7.6.4 yamt const int, const npf_addr_t *, const npf_netmask_t);
212 1.7.6.4 yamt int npf_table_lookup(npf_tableset_t *, u_int,
213 1.7.6.4 yamt const int, const npf_addr_t *);
214 1.7.6.4 yamt int npf_table_list(npf_tableset_t *, u_int, void *, size_t);
215 1.1 rmind
216 1.1 rmind /* Ruleset interface. */
217 1.1 rmind npf_ruleset_t * npf_ruleset_create(void);
218 1.1 rmind void npf_ruleset_destroy(npf_ruleset_t *);
219 1.1 rmind void npf_ruleset_insert(npf_ruleset_t *, npf_rule_t *);
220 1.5 rmind void npf_ruleset_natreload(npf_ruleset_t *, npf_ruleset_t *);
221 1.5 rmind npf_rule_t * npf_ruleset_matchnat(npf_ruleset_t *, npf_natpolicy_t *);
222 1.6 rmind npf_rule_t * npf_ruleset_sharepm(npf_ruleset_t *, npf_natpolicy_t *);
223 1.7 rmind npf_rule_t * npf_ruleset_replace(const char *, npf_ruleset_t *);
224 1.7.6.4 yamt void npf_ruleset_freealg(npf_ruleset_t *, npf_alg_t *);
225 1.1 rmind
226 1.7.6.5 yamt npf_rule_t * npf_ruleset_inspect(npf_cache_t *, nbuf_t *,
227 1.7.6.5 yamt const npf_ruleset_t *, const int, const int);
228 1.5 rmind int npf_rule_apply(npf_cache_t *, nbuf_t *, npf_rule_t *, int *);
229 1.5 rmind
230 1.7 rmind /* Rule interface. */
231 1.7 rmind npf_rule_t * npf_rule_alloc(prop_dictionary_t, npf_rproc_t *, void *, size_t);
232 1.7 rmind void npf_rule_free(npf_rule_t *);
233 1.1 rmind npf_ruleset_t * npf_rule_subset(npf_rule_t *);
234 1.1 rmind npf_natpolicy_t *npf_rule_getnat(const npf_rule_t *);
235 1.1 rmind void npf_rule_setnat(npf_rule_t *, npf_natpolicy_t *);
236 1.7.6.2 yamt npf_rproc_t * npf_rule_getrproc(npf_rule_t *);
237 1.1 rmind
238 1.7.6.4 yamt void npf_ext_sysinit(void);
239 1.7.6.4 yamt void npf_ext_sysfini(void);
240 1.7.6.4 yamt int npf_ext_construct(const char *,
241 1.7.6.4 yamt npf_rproc_t *, prop_dictionary_t);
242 1.7.6.4 yamt
243 1.5 rmind npf_rproc_t * npf_rproc_create(prop_dictionary_t);
244 1.7.6.2 yamt void npf_rproc_acquire(npf_rproc_t *);
245 1.5 rmind void npf_rproc_release(npf_rproc_t *);
246 1.7.6.4 yamt void npf_rproc_run(npf_cache_t *, nbuf_t *, npf_rproc_t *, int *);
247 1.5 rmind
248 1.4 rmind /* Session handling interface. */
249 1.5 rmind void npf_session_sysinit(void);
250 1.1 rmind void npf_session_sysfini(void);
251 1.1 rmind int npf_session_tracking(bool);
252 1.1 rmind
253 1.5 rmind npf_sehash_t * sess_htable_create(void);
254 1.5 rmind void sess_htable_destroy(npf_sehash_t *);
255 1.5 rmind void sess_htable_reload(npf_sehash_t *);
256 1.5 rmind
257 1.7.6.5 yamt npf_session_t * npf_session_lookup(const npf_cache_t *, const nbuf_t *,
258 1.7.6.5 yamt const int, bool *);
259 1.7.6.5 yamt npf_session_t * npf_session_inspect(npf_cache_t *, nbuf_t *, const int, int *);
260 1.7.6.5 yamt npf_session_t * npf_session_establish(npf_cache_t *, nbuf_t *, const int);
261 1.1 rmind void npf_session_release(npf_session_t *);
262 1.5 rmind void npf_session_expire(npf_session_t *);
263 1.5 rmind bool npf_session_pass(const npf_session_t *, npf_rproc_t **);
264 1.5 rmind void npf_session_setpass(npf_session_t *, npf_rproc_t *);
265 1.5 rmind int npf_session_setnat(npf_session_t *, npf_nat_t *, const int);
266 1.2 rmind npf_nat_t * npf_session_retnat(npf_session_t *, const int, bool *);
267 1.1 rmind
268 1.5 rmind int npf_session_save(prop_array_t, prop_array_t);
269 1.5 rmind int npf_session_restore(npf_sehash_t *, prop_dictionary_t);
270 1.5 rmind
271 1.4 rmind /* State handling. */
272 1.7.6.5 yamt bool npf_state_init(npf_cache_t *, nbuf_t *, npf_state_t *);
273 1.7.6.5 yamt bool npf_state_inspect(npf_cache_t *, nbuf_t *, npf_state_t *,
274 1.4 rmind const bool);
275 1.4 rmind int npf_state_etime(const npf_state_t *, const int);
276 1.4 rmind void npf_state_destroy(npf_state_t *);
277 1.4 rmind
278 1.7.6.5 yamt bool npf_state_tcp(npf_cache_t *, nbuf_t *, npf_state_t *, int);
279 1.7.6.2 yamt int npf_state_tcp_timeout(const npf_state_t *);
280 1.7.6.2 yamt
281 1.1 rmind /* NAT. */
282 1.1 rmind void npf_nat_sysinit(void);
283 1.1 rmind void npf_nat_sysfini(void);
284 1.6 rmind npf_natpolicy_t *npf_nat_newpolicy(prop_dictionary_t, npf_ruleset_t *);
285 1.1 rmind void npf_nat_freepolicy(npf_natpolicy_t *);
286 1.5 rmind bool npf_nat_matchpolicy(npf_natpolicy_t *, npf_natpolicy_t *);
287 1.6 rmind bool npf_nat_sharepm(npf_natpolicy_t *, npf_natpolicy_t *);
288 1.7.6.4 yamt void npf_nat_freealg(npf_natpolicy_t *, npf_alg_t *);
289 1.1 rmind
290 1.7.6.5 yamt int npf_do_nat(npf_cache_t *, npf_session_t *, nbuf_t *, const int);
291 1.7.6.5 yamt int npf_nat_translate(npf_cache_t *, nbuf_t *, npf_nat_t *,
292 1.7.6.5 yamt const bool, const int);
293 1.1 rmind void npf_nat_expire(npf_nat_t *);
294 1.4 rmind void npf_nat_getorig(npf_nat_t *, npf_addr_t **, in_port_t *);
295 1.5 rmind void npf_nat_gettrans(npf_nat_t *, npf_addr_t **, in_port_t *);
296 1.1 rmind void npf_nat_setalg(npf_nat_t *, npf_alg_t *, uintptr_t);
297 1.1 rmind
298 1.5 rmind int npf_nat_save(prop_dictionary_t, prop_array_t, npf_nat_t *);
299 1.5 rmind npf_nat_t * npf_nat_restore(prop_dictionary_t, npf_session_t *);
300 1.5 rmind
301 1.1 rmind /* ALG interface. */
302 1.1 rmind void npf_alg_sysinit(void);
303 1.1 rmind void npf_alg_sysfini(void);
304 1.7.6.5 yamt npf_alg_t * npf_alg_register(npf_alg_func_t, npf_alg_func_t,
305 1.7.6.5 yamt npf_alg_sfunc_t);
306 1.1 rmind int npf_alg_unregister(npf_alg_t *);
307 1.7.6.5 yamt bool npf_alg_match(npf_cache_t *, nbuf_t *, npf_nat_t *, int);
308 1.7.6.5 yamt void npf_alg_exec(npf_cache_t *, nbuf_t *, npf_nat_t *, int);
309 1.7.6.5 yamt npf_session_t * npf_alg_session(npf_cache_t *, nbuf_t *, int);
310 1.1 rmind
311 1.1 rmind /* Debugging routines. */
312 1.7.6.4 yamt void npf_addr_dump(const npf_addr_t *);
313 1.7.6.4 yamt void npf_rulenc_dump(const npf_rule_t *);
314 1.1 rmind void npf_sessions_dump(void);
315 1.7.6.4 yamt void npf_state_dump(const npf_state_t *);
316 1.7.6.4 yamt void npf_nat_dump(const npf_nat_t *);
317 1.7.6.4 yamt void npf_state_setsampler(void (*)(npf_state_t *, bool));
318 1.1 rmind
319 1.7 rmind #endif /* _NPF_IMPL_H_ */
320