2 * SPDX-License-Identifier: BSD-2-Clause
4 * Copyright (c) 2021 Rubicon Communications, LLC (Netgate)
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
11 * - Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * - Redistributions in binary form must reproduce the above
14 * copyright notice, this list of conditions and the following
15 * disclaimer in the documentation and/or other materials provided
16 * with the distribution.
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
21 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
22 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
24 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
25 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
26 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
28 * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
34 #ifndef _PFCTL_IOCTL_H_
35 #define _PFCTL_IOCTL_H_
37 #include <netpfil/pf/pf.h>
42 struct pf_palist list;
43 struct pf_pooladdr *cur;
44 struct pf_poolhashkey key;
45 struct pf_addr counter;
46 struct pf_mape_portset mape;
48 u_int16_t proxy_port[2];
53 struct pf_rule_addr src;
54 struct pf_rule_addr dst;
55 union pf_rule_ptr skip[PF_SKIP_COUNT];
56 char label[PF_RULE_MAX_LABEL_COUNT][PF_RULE_LABEL_SIZE];
57 char ifname[IFNAMSIZ];
58 char qname[PF_QNAME_SIZE];
59 char pqname[PF_QNAME_SIZE];
60 char tagname[PF_TAG_NAME_SIZE];
61 char match_tagname[PF_TAG_NAME_SIZE];
63 char overload_tblname[PF_TABLE_NAME_SIZE];
65 TAILQ_ENTRY(pfctl_rule) entries;
66 struct pfctl_pool rpool;
68 u_int64_t evaluations;
73 struct pfctl_anchor *anchor;
74 struct pfr_ktable *overload_tbl;
76 pf_osfp_t os_fingerprint;
79 u_int32_t timeout[PFTM_MAX];
81 u_int32_t max_src_nodes;
82 u_int32_t max_src_states;
83 u_int32_t max_src_conn;
99 u_int16_t return_icmp;
100 u_int16_t return_icmp6;
104 u_int16_t scrub_flags;
106 struct pf_rule_uid uid;
107 struct pf_rule_gid gid;
116 u_int8_t match_tag_not;
132 u_int8_t anchor_relative;
133 u_int8_t anchor_wildcard;
137 u_int8_t set_prio[2];
145 TAILQ_HEAD(pfctl_rulequeue, pfctl_rule);
147 struct pfctl_ruleset {
149 struct pfctl_rulequeue queues[2];
151 struct pfctl_rulequeue *ptr;
152 struct pfctl_rule **ptr_array;
157 } rules[PF_RULESET_MAX];
158 struct pfctl_anchor *anchor;
164 RB_HEAD(pfctl_anchor_global, pfctl_anchor);
165 RB_HEAD(pfctl_anchor_node, pfctl_anchor);
166 struct pfctl_anchor {
167 RB_ENTRY(pfctl_anchor) entry_global;
168 RB_ENTRY(pfctl_anchor) entry_node;
169 struct pfctl_anchor *parent;
170 struct pfctl_anchor_node children;
171 char name[PF_ANCHOR_NAME_SIZE];
172 char path[MAXPATHLEN];
173 struct pfctl_ruleset ruleset;
174 int refcnt; /* anchor rules */
175 int match; /* XXX: used for pfctl black magic */
177 RB_PROTOTYPE(pfctl_anchor_global, pfctl_anchor, entry_global,
179 RB_PROTOTYPE(pfctl_anchor_node, pfctl_anchor, entry_node,
182 struct pfctl_state_cmp {
189 struct pfctl_state_cmp cmp;
192 struct pf_rule_addr src;
193 struct pf_rule_addr dst;
194 struct pf_rule_addr rt_addr;
195 char ifname[IFNAMSIZ];
196 char label[PF_RULE_LABEL_SIZE];
200 int pfctl_get_rule(int dev, u_int32_t nr, u_int32_t ticket,
201 const char *anchor, u_int32_t ruleset, struct pfctl_rule *rule,
203 int pfctl_get_clear_rule(int dev, u_int32_t nr, u_int32_t ticket,
204 const char *anchor, u_int32_t ruleset, struct pfctl_rule *rule,
205 char *anchor_call, bool clear);
206 int pfctl_add_rule(int dev, const struct pfctl_rule *r,
207 const char *anchor, const char *anchor_call, u_int32_t ticket,
208 u_int32_t pool_ticket);
209 int pfctl_set_keepcounters(int dev, bool keep);
210 int pfctl_clear_states(int dev, const struct pfctl_kill *kill,
211 unsigned int *killed);
212 int pfctl_kill_states(int dev, const struct pfctl_kill *kill,
213 unsigned int *killed);