2003-09-23 17:54:04 +00:00
|
|
|
/* $FreeBSD$ */
|
|
|
|
/* $NetBSD: pfil.h,v 1.22 2003/06/23 12:57:08 martin Exp $ */
|
2000-05-10 13:37:51 +00:00
|
|
|
|
2005-01-07 01:45:51 +00:00
|
|
|
/*-
|
2000-05-10 13:37:51 +00:00
|
|
|
* Copyright (c) 1996 Matthew R. Green
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. The name of the author may not be used to endorse or promote products
|
|
|
|
* derived from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _NET_PFIL_H_
|
|
|
|
#define _NET_PFIL_H_
|
|
|
|
|
2003-09-23 17:54:04 +00:00
|
|
|
#include <sys/systm.h>
|
2004-06-19 14:58:35 +00:00
|
|
|
#include <sys/queue.h>
|
2003-09-23 17:54:04 +00:00
|
|
|
#include <sys/_lock.h>
|
|
|
|
#include <sys/_mutex.h>
|
2006-02-02 20:33:10 +00:00
|
|
|
#include <sys/lock.h>
|
2007-11-25 12:41:47 +00:00
|
|
|
#include <sys/rmlock.h>
|
2000-05-10 13:37:51 +00:00
|
|
|
|
|
|
|
struct mbuf;
|
|
|
|
struct ifnet;
|
2004-09-29 04:54:33 +00:00
|
|
|
struct inpcb;
|
2000-05-10 13:37:51 +00:00
|
|
|
|
2013-08-24 10:13:59 +00:00
|
|
|
typedef int (*pfil_func_t)(void *, struct mbuf **, struct ifnet *, int,
|
|
|
|
struct inpcb *);
|
|
|
|
|
2000-05-10 13:37:51 +00:00
|
|
|
/*
|
|
|
|
* The packet filter hooks are designed for anything to call them to
|
2013-08-24 11:17:25 +00:00
|
|
|
* possibly intercept the packet. Multiple filter hooks are chained
|
|
|
|
* together and after each other in the specified order.
|
2000-05-10 13:37:51 +00:00
|
|
|
*/
|
|
|
|
struct packet_filter_hook {
|
2013-08-24 12:03:24 +00:00
|
|
|
TAILQ_ENTRY(packet_filter_hook) pfil_chain;
|
|
|
|
pfil_func_t pfil_func;
|
|
|
|
void *pfil_arg;
|
2000-05-10 13:37:51 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
#define PFIL_IN 0x00000001
|
|
|
|
#define PFIL_OUT 0x00000002
|
|
|
|
#define PFIL_WAITOK 0x00000004
|
|
|
|
#define PFIL_ALL (PFIL_IN|PFIL_OUT)
|
|
|
|
|
2013-08-24 11:17:25 +00:00
|
|
|
typedef TAILQ_HEAD(pfil_chain, packet_filter_hook) pfil_chain_t;
|
2000-05-10 13:37:51 +00:00
|
|
|
|
2003-09-23 17:54:04 +00:00
|
|
|
#define PFIL_TYPE_AF 1 /* key is AF_* type */
|
|
|
|
#define PFIL_TYPE_IFNET 2 /* key is ifnet pointer */
|
|
|
|
|
2012-10-22 14:10:17 +00:00
|
|
|
#define PFIL_FLAG_PRIVATE_LOCK 0x01 /* Personal lock instead of global */
|
|
|
|
|
2013-08-24 11:17:25 +00:00
|
|
|
/*
|
|
|
|
* A pfil head is created by each protocol or packet intercept point.
|
|
|
|
* For packet is then run through the hook chain for inspection.
|
|
|
|
*/
|
2000-05-10 13:37:51 +00:00
|
|
|
struct pfil_head {
|
2013-08-24 12:03:24 +00:00
|
|
|
pfil_chain_t ph_in;
|
|
|
|
pfil_chain_t ph_out;
|
|
|
|
int ph_type;
|
|
|
|
int ph_nhooks;
|
2010-07-15 14:41:06 +00:00
|
|
|
#if defined( __linux__ ) || defined( _WIN32 )
|
2013-08-24 12:03:24 +00:00
|
|
|
rwlock_t ph_mtx;
|
2010-07-15 14:41:06 +00:00
|
|
|
#else
|
2012-10-22 14:10:17 +00:00
|
|
|
struct rmlock *ph_plock; /* Pointer to the used lock */
|
2013-08-24 12:03:24 +00:00
|
|
|
struct rmlock ph_lock; /* Private lock storage */
|
|
|
|
int flags;
|
2010-07-15 14:41:06 +00:00
|
|
|
#endif
|
2003-09-23 17:54:04 +00:00
|
|
|
union {
|
2013-08-24 12:03:24 +00:00
|
|
|
u_long phu_val;
|
|
|
|
void *phu_ptr;
|
2003-09-23 17:54:04 +00:00
|
|
|
} ph_un;
|
2013-08-24 12:03:24 +00:00
|
|
|
#define ph_af ph_un.phu_val
|
|
|
|
#define ph_ifnet ph_un.phu_ptr
|
2003-09-23 17:54:04 +00:00
|
|
|
LIST_ENTRY(pfil_head) ph_list;
|
2001-10-22 08:46:23 +00:00
|
|
|
};
|
2000-05-10 13:37:51 +00:00
|
|
|
|
2013-08-24 11:17:25 +00:00
|
|
|
/* Public functions for pfil hook management by packet filters. */
|
|
|
|
struct pfil_head *pfil_head_get(int, u_long);
|
2013-08-24 10:13:59 +00:00
|
|
|
int pfil_add_hook(pfil_func_t, void *, int, struct pfil_head *);
|
|
|
|
int pfil_remove_hook(pfil_func_t, void *, int, struct pfil_head *);
|
2013-08-24 12:03:24 +00:00
|
|
|
#define PFIL_HOOKED(p) ((p)->ph_nhooks > 0)
|
2013-08-24 11:17:25 +00:00
|
|
|
|
|
|
|
/* Public functions to run the packet inspection by protocols. */
|
2003-09-23 17:54:04 +00:00
|
|
|
int pfil_run_hooks(struct pfil_head *, struct mbuf **, struct ifnet *,
|
2004-09-29 04:54:33 +00:00
|
|
|
int, struct inpcb *inp);
|
2003-09-23 17:54:04 +00:00
|
|
|
|
2013-08-24 11:17:25 +00:00
|
|
|
/* Public functions for pfil head management by protocols. */
|
|
|
|
int pfil_head_register(struct pfil_head *);
|
|
|
|
int pfil_head_unregister(struct pfil_head *);
|
|
|
|
|
2013-08-24 12:03:24 +00:00
|
|
|
/* Public pfil locking functions for self managed locks by packet filters. */
|
2012-10-22 14:10:17 +00:00
|
|
|
struct rm_priotracker; /* Do not require including rmlock header */
|
2013-08-24 12:03:24 +00:00
|
|
|
int pfil_try_rlock(struct pfil_head *, struct rm_priotracker *);
|
|
|
|
void pfil_rlock(struct pfil_head *, struct rm_priotracker *);
|
|
|
|
void pfil_runlock(struct pfil_head *, struct rm_priotracker *);
|
|
|
|
void pfil_wlock(struct pfil_head *);
|
|
|
|
void pfil_wunlock(struct pfil_head *);
|
|
|
|
int pfil_wowned(struct pfil_head *ph);
|
2012-10-22 14:10:17 +00:00
|
|
|
|
2013-08-24 12:03:24 +00:00
|
|
|
/* Internal pfil locking functions. */
|
2012-10-22 14:10:17 +00:00
|
|
|
#define PFIL_LOCK_INIT_REAL(l, t) \
|
|
|
|
rm_init_flags(l, "PFil " t " rmlock", RM_RECURSE)
|
|
|
|
#define PFIL_LOCK_DESTROY_REAL(l) \
|
|
|
|
rm_destroy(l)
|
|
|
|
#define PFIL_LOCK_INIT(p) do { \
|
|
|
|
if ((p)->flags & PFIL_FLAG_PRIVATE_LOCK) { \
|
|
|
|
PFIL_LOCK_INIT_REAL(&(p)->ph_lock, "private"); \
|
|
|
|
(p)->ph_plock = &(p)->ph_lock; \
|
|
|
|
} else \
|
|
|
|
(p)->ph_plock = &V_pfil_lock; \
|
|
|
|
} while (0)
|
|
|
|
#define PFIL_LOCK_DESTROY(p) do { \
|
|
|
|
if ((p)->flags & PFIL_FLAG_PRIVATE_LOCK) \
|
|
|
|
PFIL_LOCK_DESTROY_REAL((p)->ph_plock); \
|
|
|
|
} while (0)
|
2013-08-24 12:03:24 +00:00
|
|
|
|
2013-03-19 05:51:47 +00:00
|
|
|
#define PFIL_TRY_RLOCK(p, t) rm_try_rlock((p)->ph_plock, (t))
|
|
|
|
#define PFIL_RLOCK(p, t) rm_rlock((p)->ph_plock, (t))
|
|
|
|
#define PFIL_WLOCK(p) rm_wlock((p)->ph_plock)
|
|
|
|
#define PFIL_RUNLOCK(p, t) rm_runlock((p)->ph_plock, (t))
|
|
|
|
#define PFIL_WUNLOCK(p) rm_wunlock((p)->ph_plock)
|
|
|
|
#define PFIL_WOWNED(p) rm_wowned((p)->ph_plock)
|
2013-08-24 11:24:15 +00:00
|
|
|
|
|
|
|
/* Internal locking macros for global/vnet pfil_head_list. */
|
|
|
|
#define PFIL_HEADLIST_LOCK() mtx_lock(&pfil_global_lock)
|
|
|
|
#define PFIL_HEADLIST_UNLOCK() mtx_unlock(&pfil_global_lock)
|
2006-02-02 03:13:16 +00:00
|
|
|
|
2000-05-10 13:37:51 +00:00
|
|
|
#endif /* _NET_PFIL_H_ */
|