2 * SPDX-License-Identifier: BSD-2-Clause
4 * Copyright (c) 2021 Rubicon Communications, LLC (Netgate)
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
11 * - Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * - Redistributions in binary form must reproduce the above
14 * copyright notice, this list of conditions and the following
15 * disclaimer in the documentation and/or other materials provided
16 * with the distribution.
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
21 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
22 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
24 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
25 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
26 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
28 * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
34 #ifndef _PFCTL_IOCTL_H_
35 #define _PFCTL_IOCTL_H_
37 #include <netpfil/pf/pf.h>
41 struct pfctl_status_counter {
46 TAILQ_ENTRY(pfctl_status_counter) entry;
48 TAILQ_HEAD(pfctl_status_counters, pfctl_status_counter);
57 char ifname[IFNAMSIZ];
58 uint8_t pf_chksum[PF_MD5_DIGEST_LENGTH];
60 struct pfctl_status_counters counters;
61 struct pfctl_status_counters lcounters;
62 struct pfctl_status_counters fcounters;
63 struct pfctl_status_counters scounters;
64 uint64_t pcounters[2][2][3];
65 uint64_t bcounters[2][2];
69 struct pf_palist list;
70 struct pf_pooladdr *cur;
71 struct pf_poolhashkey key;
72 struct pf_addr counter;
73 struct pf_mape_portset mape;
75 uint16_t proxy_port[2];
79 struct pfctl_rules_info {
85 struct pf_rule_addr src;
86 struct pf_rule_addr dst;
87 union pf_rule_ptr skip[PF_SKIP_COUNT];
88 char label[PF_RULE_MAX_LABEL_COUNT][PF_RULE_LABEL_SIZE];
90 char ifname[IFNAMSIZ];
91 char qname[PF_QNAME_SIZE];
92 char pqname[PF_QNAME_SIZE];
93 char tagname[PF_TAG_NAME_SIZE];
94 char match_tagname[PF_TAG_NAME_SIZE];
96 char overload_tblname[PF_TABLE_NAME_SIZE];
98 TAILQ_ENTRY(pfctl_rule) entries;
99 struct pfctl_pool rpool;
101 uint64_t evaluations;
106 struct pfctl_anchor *anchor;
107 struct pfr_ktable *overload_tbl;
109 pf_osfp_t os_fingerprint;
112 uint32_t timeout[PFTM_MAX];
114 uint32_t max_src_nodes;
115 uint32_t max_src_states;
116 uint32_t max_src_conn;
132 uint16_t return_icmp;
133 uint16_t return_icmp6;
137 uint16_t scrub_flags;
139 struct pf_rule_uid uid;
140 struct pf_rule_gid gid;
149 uint8_t match_tag_not;
165 uint8_t anchor_relative;
166 uint8_t anchor_wildcard;
178 TAILQ_HEAD(pfctl_rulequeue, pfctl_rule);
180 struct pfctl_ruleset {
182 struct pfctl_rulequeue queues[2];
184 struct pfctl_rulequeue *ptr;
185 struct pfctl_rule **ptr_array;
190 } rules[PF_RULESET_MAX];
191 struct pfctl_anchor *anchor;
197 RB_HEAD(pfctl_anchor_global, pfctl_anchor);
198 RB_HEAD(pfctl_anchor_node, pfctl_anchor);
199 struct pfctl_anchor {
200 RB_ENTRY(pfctl_anchor) entry_global;
201 RB_ENTRY(pfctl_anchor) entry_node;
202 struct pfctl_anchor *parent;
203 struct pfctl_anchor_node children;
204 char name[PF_ANCHOR_NAME_SIZE];
205 char path[MAXPATHLEN];
206 struct pfctl_ruleset ruleset;
207 int refcnt; /* anchor rules */
208 int match; /* XXX: used for pfctl black magic */
210 RB_PROTOTYPE(pfctl_anchor_global, pfctl_anchor, entry_global,
212 RB_PROTOTYPE(pfctl_anchor_node, pfctl_anchor, entry_node,
215 struct pfctl_state_cmp {
222 struct pfctl_state_cmp cmp;
225 struct pf_rule_addr src;
226 struct pf_rule_addr dst;
227 struct pf_rule_addr rt_addr;
228 char ifname[IFNAMSIZ];
229 char label[PF_RULE_LABEL_SIZE];
233 struct pfctl_state_peer {
241 struct pfctl_state_key {
242 struct pf_addr addr[2];
249 TAILQ_ENTRY(pfctl_state) entry;
255 struct pfctl_state_peer src;
256 struct pfctl_state_peer dst;
261 struct pf_addr rt_addr;
262 struct pfctl_state_key key[2]; /* addresses stack and wire */
263 char ifname[IFNAMSIZ];
264 char orig_ifname[IFNAMSIZ];
269 uint32_t pfsync_time;
274 TAILQ_HEAD(pfctl_statelist, pfctl_state);
275 struct pfctl_states {
276 struct pfctl_statelist states;
280 enum pfctl_syncookies_mode {
281 PFCTL_SYNCOOKIES_NEVER,
282 PFCTL_SYNCOOKIES_ALWAYS,
283 PFCTL_SYNCOOKIES_ADAPTIVE
285 extern const char* PFCTL_SYNCOOKIES_MODE_NAMES[];
287 struct pfctl_syncookies {
288 enum pfctl_syncookies_mode mode;
289 uint8_t highwater; /* Percent */
290 uint8_t lowwater; /* Percent */
293 struct pfctl_status* pfctl_get_status(int dev);
294 void pfctl_free_status(struct pfctl_status *status);
296 int pfctl_get_rules_info(int dev, struct pfctl_rules_info *rules,
297 uint32_t ruleset, const char *path);
298 int pfctl_get_rule(int dev, uint32_t nr, uint32_t ticket,
299 const char *anchor, uint32_t ruleset, struct pfctl_rule *rule,
301 int pfctl_get_clear_rule(int dev, uint32_t nr, uint32_t ticket,
302 const char *anchor, uint32_t ruleset, struct pfctl_rule *rule,
303 char *anchor_call, bool clear);
304 int pfctl_add_rule(int dev, const struct pfctl_rule *r,
305 const char *anchor, const char *anchor_call, uint32_t ticket,
306 uint32_t pool_ticket);
307 int pfctl_set_keepcounters(int dev, bool keep);
308 int pfctl_get_states(int dev, struct pfctl_states *states);
309 void pfctl_free_states(struct pfctl_states *states);
310 int pfctl_clear_states(int dev, const struct pfctl_kill *kill,
311 unsigned int *killed);
312 int pfctl_kill_states(int dev, const struct pfctl_kill *kill,
313 unsigned int *killed);
314 int pfctl_clear_rules(int dev, const char *anchorname);
315 int pfctl_clear_nat(int dev, const char *anchorname);
316 int pfctl_set_syncookies(int dev, const struct pfctl_syncookies *s);
317 int pfctl_get_syncookies(int dev, struct pfctl_syncookies *s);
318 int pfctl_table_add_addrs(int dev, struct pfr_table *tbl, struct pfr_addr
319 *addr, int size, int *nadd, int flags);
320 int pfctl_table_del_addrs(int dev, struct pfr_table *tbl, struct pfr_addr
321 *addr, int size, int *ndel, int flags);
322 int pfctl_table_set_addrs(int dev, struct pfr_table *tbl, struct pfr_addr
323 *addr, int size, int *size2, int *nadd, int *ndel, int *nchange,
325 int pfctl_table_get_addrs(int dev, struct pfr_table *tbl, struct pfr_addr
326 *addr, int *size, int flags);