1d17aef79SPedro F. Giffuni /*- 2571f8c1bSLuigi Rizzo * Copyright (c) 2002-2003 Luigi Rizzo 39758b77fSLuigi Rizzo * Copyright (c) 1996 Alex Nash, Paul Traina, Poul-Henning Kamp 49758b77fSLuigi Rizzo * Copyright (c) 1994 Ugen J.S.Antsilevich 59758b77fSLuigi Rizzo * 69758b77fSLuigi Rizzo * Idea and grammar partially left from: 79758b77fSLuigi Rizzo * Copyright (c) 1993 Daniel Boulet 89758b77fSLuigi Rizzo * 99758b77fSLuigi Rizzo * Redistribution and use in source forms, with and without modification, 109758b77fSLuigi Rizzo * are permitted provided that this entire comment appears intact. 119758b77fSLuigi Rizzo * 129758b77fSLuigi Rizzo * Redistribution in binary form may occur without any restrictions. 139758b77fSLuigi Rizzo * Obviously, it would be nice if you gave credit where credit is due 149758b77fSLuigi Rizzo * but requiring it would be too onerous. 159758b77fSLuigi Rizzo * 169758b77fSLuigi Rizzo * This software is provided ``AS IS'' without any warranties of any kind. 179758b77fSLuigi Rizzo * 189758b77fSLuigi Rizzo * NEW command line interface for IP firewall facility 199758b77fSLuigi Rizzo */ 209758b77fSLuigi Rizzo 21e5dbf736SLuigi Rizzo #include <sys/types.h> 225f301949SBen Laurie #include <sys/param.h> 239758b77fSLuigi Rizzo #include <sys/socket.h> 249758b77fSLuigi Rizzo #include <sys/sockio.h> 259758b77fSLuigi Rizzo #include <sys/sysctl.h> 263c0c8717SLuigi Rizzo 273c0c8717SLuigi Rizzo #include "ipfw2.h" 289758b77fSLuigi Rizzo 299758b77fSLuigi Rizzo #include <ctype.h> 309758b77fSLuigi Rizzo #include <err.h> 319758b77fSLuigi Rizzo #include <errno.h> 329758b77fSLuigi Rizzo #include <grp.h> 33de68a320SJamie Gritton #include <jail.h> 349758b77fSLuigi Rizzo #include <netdb.h> 359758b77fSLuigi Rizzo #include <pwd.h> 369758b77fSLuigi Rizzo #include <stdio.h> 37563b5ab1SAlexander V. Chernikov #include <stdarg.h> 38aac74aeaSAndrey V. Elsukov #include <stdint.h> 399758b77fSLuigi Rizzo #include <stdlib.h> 409758b77fSLuigi Rizzo #include <string.h> 419758b77fSLuigi Rizzo #include <sysexits.h> 4223c608c8SLuigi Rizzo #include <time.h> /* ctime */ 43e5dbf736SLuigi Rizzo #include <timeconv.h> /* _long_to_time */ 44974dfe30SBrian Feldman #include <unistd.h> 45974dfe30SBrian Feldman #include <fcntl.h> 46f8bee51aSAlexander V. Chernikov #include <stddef.h> /* offsetof */ 479758b77fSLuigi Rizzo 48bd1d3456SMaxim Konovalov #include <net/ethernet.h> 4923c608c8SLuigi Rizzo #include <net/if.h> /* only IFNAMSIZ */ 509758b77fSLuigi Rizzo #include <netinet/in.h> 5123c608c8SLuigi Rizzo #include <netinet/in_systm.h> /* only n_short, n_long */ 529758b77fSLuigi Rizzo #include <netinet/ip.h> 539758b77fSLuigi Rizzo #include <netinet/ip_icmp.h> 549758b77fSLuigi Rizzo #include <netinet/ip_fw.h> 559758b77fSLuigi Rizzo #include <netinet/tcp.h> 569758b77fSLuigi Rizzo #include <arpa/inet.h> 579758b77fSLuigi Rizzo 5856707beeSMark Johnston struct cmdline_opts g_co; /* global options */ 59db7c5224SLuigi Rizzo 60563b5ab1SAlexander V. Chernikov struct format_opts { 61563b5ab1SAlexander V. Chernikov int bcwidth; 62563b5ab1SAlexander V. Chernikov int pcwidth; 63563b5ab1SAlexander V. Chernikov int show_counters; 645d439467SAlexander V. Chernikov int show_time; /* show timestamp */ 657e767c79SAlexander V. Chernikov uint32_t set_mask; /* enabled sets mask */ 662aa75134SAlexander V. Chernikov uint32_t flags; /* request flags */ 672aa75134SAlexander V. Chernikov uint32_t first; /* first rule to request */ 682aa75134SAlexander V. Chernikov uint32_t last; /* last rule to request */ 696447bae6SAlexander V. Chernikov uint32_t dcnt; /* number of dynamic states */ 702aa75134SAlexander V. Chernikov ipfw_obj_ctlv *tstate; /* table state data */ 71563b5ab1SAlexander V. Chernikov }; 72563b5ab1SAlexander V. Chernikov 733c0c8717SLuigi Rizzo int resvd_set_number = RESVD_SET; 749758b77fSLuigi Rizzo 7556707beeSMark Johnston static int ipfw_socket = -1; 76f8bee51aSAlexander V. Chernikov 77579ed7bdSAlexander V. Chernikov #define CHECK_LENGTH(v, len) do { \ 78579ed7bdSAlexander V. Chernikov if ((v) < (len)) \ 79579ed7bdSAlexander V. Chernikov errx(EX_DATAERR, "Rule too long"); \ 80579ed7bdSAlexander V. Chernikov } while (0) 81579ed7bdSAlexander V. Chernikov /* 82579ed7bdSAlexander V. Chernikov * Check if we have enough space in cmd buffer. Note that since 83579ed7bdSAlexander V. Chernikov * first 8? u32 words are reserved by reserved header, full cmd 84579ed7bdSAlexander V. Chernikov * buffer can't be used, so we need to protect from buffer overrun 85b68ac800SPedro F. Giffuni * only. At the beginning, cblen is less than actual buffer size by 86579ed7bdSAlexander V. Chernikov * size of ipfw_insn_u32 instruction + 1 u32 work. This eliminates need 87579ed7bdSAlexander V. Chernikov * for checking small instructions fitting in given range. 88579ed7bdSAlexander V. Chernikov * We also (ab)use the fact that ipfw_insn is always the first field 89579ed7bdSAlexander V. Chernikov * for any custom instruction. 90579ed7bdSAlexander V. Chernikov */ 91579ed7bdSAlexander V. Chernikov #define CHECK_CMDLEN CHECK_LENGTH(cblen, F_LEN((ipfw_insn *)cmd)) 92579ed7bdSAlexander V. Chernikov 93254c4725SOleg Bulyzhin #define GET_UINT_ARG(arg, min, max, tok, s_x) do { \ 94cc4d3c30SLuigi Rizzo if (!av[0]) \ 95254c4725SOleg Bulyzhin errx(EX_USAGE, "%s: missing argument", match_value(s_x, tok)); \ 96254c4725SOleg Bulyzhin if (_substrcmp(*av, "tablearg") == 0) { \ 971940fa77SAlexander V. Chernikov arg = IP_FW_TARG; \ 98254c4725SOleg Bulyzhin break; \ 996a7d5cb6SOleg Bulyzhin } \ 100254c4725SOleg Bulyzhin \ 101254c4725SOleg Bulyzhin { \ 102cc4d3c30SLuigi Rizzo long _xval; \ 103254c4725SOleg Bulyzhin char *end; \ 104254c4725SOleg Bulyzhin \ 105cc4d3c30SLuigi Rizzo _xval = strtol(*av, &end, 10); \ 106254c4725SOleg Bulyzhin \ 107cc4d3c30SLuigi Rizzo if (!isdigit(**av) || *end != '\0' || (_xval == 0 && errno == EINVAL)) \ 108254c4725SOleg Bulyzhin errx(EX_DATAERR, "%s: invalid argument: %s", \ 109254c4725SOleg Bulyzhin match_value(s_x, tok), *av); \ 110254c4725SOleg Bulyzhin \ 111cc4d3c30SLuigi Rizzo if (errno == ERANGE || _xval < min || _xval > max) \ 112254c4725SOleg Bulyzhin errx(EX_DATAERR, "%s: argument is out of range (%u..%u): %s", \ 113254c4725SOleg Bulyzhin match_value(s_x, tok), min, max, *av); \ 114254c4725SOleg Bulyzhin \ 1151940fa77SAlexander V. Chernikov if (_xval == IP_FW_TARG) \ 116254c4725SOleg Bulyzhin errx(EX_DATAERR, "%s: illegal argument value: %s", \ 117254c4725SOleg Bulyzhin match_value(s_x, tok), *av); \ 118cc4d3c30SLuigi Rizzo arg = _xval; \ 119254c4725SOleg Bulyzhin } \ 120254c4725SOleg Bulyzhin } while (0) 121254c4725SOleg Bulyzhin 1229758b77fSLuigi Rizzo static struct _s_x f_tcpflags[] = { 1239758b77fSLuigi Rizzo { "syn", TH_SYN }, 1249758b77fSLuigi Rizzo { "fin", TH_FIN }, 1259758b77fSLuigi Rizzo { "ack", TH_ACK }, 1269758b77fSLuigi Rizzo { "psh", TH_PUSH }, 1279758b77fSLuigi Rizzo { "rst", TH_RST }, 1289758b77fSLuigi Rizzo { "urg", TH_URG }, 1299758b77fSLuigi Rizzo { "tcp flag", 0 }, 1309758b77fSLuigi Rizzo { NULL, 0 } 1319758b77fSLuigi Rizzo }; 1329758b77fSLuigi Rizzo 1339758b77fSLuigi Rizzo static struct _s_x f_tcpopts[] = { 1349758b77fSLuigi Rizzo { "mss", IP_FW_TCPOPT_MSS }, 1359758b77fSLuigi Rizzo { "maxseg", IP_FW_TCPOPT_MSS }, 1369758b77fSLuigi Rizzo { "window", IP_FW_TCPOPT_WINDOW }, 1379758b77fSLuigi Rizzo { "sack", IP_FW_TCPOPT_SACK }, 1389758b77fSLuigi Rizzo { "ts", IP_FW_TCPOPT_TS }, 1399758b77fSLuigi Rizzo { "timestamp", IP_FW_TCPOPT_TS }, 1409758b77fSLuigi Rizzo { "cc", IP_FW_TCPOPT_CC }, 1419758b77fSLuigi Rizzo { "tcp option", 0 }, 1429758b77fSLuigi Rizzo { NULL, 0 } 1439758b77fSLuigi Rizzo }; 1449758b77fSLuigi Rizzo 1459758b77fSLuigi Rizzo /* 1469758b77fSLuigi Rizzo * IP options span the range 0 to 255 so we need to remap them 1479758b77fSLuigi Rizzo * (though in fact only the low 5 bits are significant). 1489758b77fSLuigi Rizzo */ 1499758b77fSLuigi Rizzo static struct _s_x f_ipopts[] = { 1509758b77fSLuigi Rizzo { "ssrr", IP_FW_IPOPT_SSRR}, 1519758b77fSLuigi Rizzo { "lsrr", IP_FW_IPOPT_LSRR}, 1529758b77fSLuigi Rizzo { "rr", IP_FW_IPOPT_RR}, 1539758b77fSLuigi Rizzo { "ts", IP_FW_IPOPT_TS}, 1549758b77fSLuigi Rizzo { "ip option", 0 }, 1559758b77fSLuigi Rizzo { NULL, 0 } 1569758b77fSLuigi Rizzo }; 1579758b77fSLuigi Rizzo 1589758b77fSLuigi Rizzo static struct _s_x f_iptos[] = { 1599758b77fSLuigi Rizzo { "lowdelay", IPTOS_LOWDELAY}, 1609758b77fSLuigi Rizzo { "throughput", IPTOS_THROUGHPUT}, 1619758b77fSLuigi Rizzo { "reliability", IPTOS_RELIABILITY}, 1629758b77fSLuigi Rizzo { "mincost", IPTOS_MINCOST}, 16306d703efSRui Paulo { "congestion", IPTOS_ECN_CE}, 16406d703efSRui Paulo { "ecntransport", IPTOS_ECN_ECT0}, 1659758b77fSLuigi Rizzo { "ip tos option", 0}, 1669758b77fSLuigi Rizzo { NULL, 0 } 1679758b77fSLuigi Rizzo }; 1689758b77fSLuigi Rizzo 169825398f9SGleb Smirnoff static struct _s_x f_ipoff[] = { 170825398f9SGleb Smirnoff { "rf", IP_RF >> 8 }, 171825398f9SGleb Smirnoff { "df", IP_DF >> 8 }, 172825398f9SGleb Smirnoff { "mf", IP_MF >> 8 }, 173825398f9SGleb Smirnoff { "offset", 0x1 }, 174825398f9SGleb Smirnoff { NULL, 0} 175825398f9SGleb Smirnoff }; 176825398f9SGleb Smirnoff 177ac35ff17SAlexander V. Chernikov struct _s_x f_ipdscp[] = { 178ae01d73cSAlexander V. Chernikov { "af11", IPTOS_DSCP_AF11 >> 2 }, /* 001010 */ 179ae01d73cSAlexander V. Chernikov { "af12", IPTOS_DSCP_AF12 >> 2 }, /* 001100 */ 180ae01d73cSAlexander V. Chernikov { "af13", IPTOS_DSCP_AF13 >> 2 }, /* 001110 */ 181ae01d73cSAlexander V. Chernikov { "af21", IPTOS_DSCP_AF21 >> 2 }, /* 010010 */ 182ae01d73cSAlexander V. Chernikov { "af22", IPTOS_DSCP_AF22 >> 2 }, /* 010100 */ 183ae01d73cSAlexander V. Chernikov { "af23", IPTOS_DSCP_AF23 >> 2 }, /* 010110 */ 184ae01d73cSAlexander V. Chernikov { "af31", IPTOS_DSCP_AF31 >> 2 }, /* 011010 */ 185ae01d73cSAlexander V. Chernikov { "af32", IPTOS_DSCP_AF32 >> 2 }, /* 011100 */ 186ae01d73cSAlexander V. Chernikov { "af33", IPTOS_DSCP_AF33 >> 2 }, /* 011110 */ 187ae01d73cSAlexander V. Chernikov { "af41", IPTOS_DSCP_AF41 >> 2 }, /* 100010 */ 188ae01d73cSAlexander V. Chernikov { "af42", IPTOS_DSCP_AF42 >> 2 }, /* 100100 */ 189ae01d73cSAlexander V. Chernikov { "af43", IPTOS_DSCP_AF43 >> 2 }, /* 100110 */ 190ae01d73cSAlexander V. Chernikov { "be", IPTOS_DSCP_CS0 >> 2 }, /* 000000 */ 191bdd60b22SJose Luis Duran { "va", IPTOS_DSCP_VA >> 2 }, /* 101100 */ 192ae01d73cSAlexander V. Chernikov { "ef", IPTOS_DSCP_EF >> 2 }, /* 101110 */ 193ae01d73cSAlexander V. Chernikov { "cs0", IPTOS_DSCP_CS0 >> 2 }, /* 000000 */ 194ae01d73cSAlexander V. Chernikov { "cs1", IPTOS_DSCP_CS1 >> 2 }, /* 001000 */ 195ae01d73cSAlexander V. Chernikov { "cs2", IPTOS_DSCP_CS2 >> 2 }, /* 010000 */ 196ae01d73cSAlexander V. Chernikov { "cs3", IPTOS_DSCP_CS3 >> 2 }, /* 011000 */ 197ae01d73cSAlexander V. Chernikov { "cs4", IPTOS_DSCP_CS4 >> 2 }, /* 100000 */ 198ae01d73cSAlexander V. Chernikov { "cs5", IPTOS_DSCP_CS5 >> 2 }, /* 101000 */ 199ae01d73cSAlexander V. Chernikov { "cs6", IPTOS_DSCP_CS6 >> 2 }, /* 110000 */ 200ae01d73cSAlexander V. Chernikov { "cs7", IPTOS_DSCP_CS7 >> 2 }, /* 100000 */ 201ae01d73cSAlexander V. Chernikov { NULL, 0 } 202ae01d73cSAlexander V. Chernikov }; 203ae01d73cSAlexander V. Chernikov 2049758b77fSLuigi Rizzo static struct _s_x limit_masks[] = { 2059758b77fSLuigi Rizzo {"all", DYN_SRC_ADDR|DYN_SRC_PORT|DYN_DST_ADDR|DYN_DST_PORT}, 2069758b77fSLuigi Rizzo {"src-addr", DYN_SRC_ADDR}, 2079758b77fSLuigi Rizzo {"src-port", DYN_SRC_PORT}, 2089758b77fSLuigi Rizzo {"dst-addr", DYN_DST_ADDR}, 2099758b77fSLuigi Rizzo {"dst-port", DYN_DST_PORT}, 2109758b77fSLuigi Rizzo {NULL, 0} 2119758b77fSLuigi Rizzo }; 2129758b77fSLuigi Rizzo 2139758b77fSLuigi Rizzo /* 2149758b77fSLuigi Rizzo * we use IPPROTO_ETHERTYPE as a fake protocol id to call the print routines 2159758b77fSLuigi Rizzo * This is only used in this code. 2169758b77fSLuigi Rizzo */ 2179758b77fSLuigi Rizzo #define IPPROTO_ETHERTYPE 0x1000 2189758b77fSLuigi Rizzo static struct _s_x ether_types[] = { 2199758b77fSLuigi Rizzo /* 2209758b77fSLuigi Rizzo * Note, we cannot use "-:&/" in the names because they are field 2219758b77fSLuigi Rizzo * separators in the type specifications. Also, we use s = NULL as 2229758b77fSLuigi Rizzo * end-delimiter, because a type of 0 can be legal. 2239758b77fSLuigi Rizzo */ 2249758b77fSLuigi Rizzo { "ip", 0x0800 }, 2259758b77fSLuigi Rizzo { "ipv4", 0x0800 }, 2269758b77fSLuigi Rizzo { "ipv6", 0x86dd }, 2279758b77fSLuigi Rizzo { "arp", 0x0806 }, 2289758b77fSLuigi Rizzo { "rarp", 0x8035 }, 2299758b77fSLuigi Rizzo { "vlan", 0x8100 }, 2309758b77fSLuigi Rizzo { "loop", 0x9000 }, 2319758b77fSLuigi Rizzo { "trail", 0x1000 }, 2329758b77fSLuigi Rizzo { "at", 0x809b }, 2339758b77fSLuigi Rizzo { "atalk", 0x809b }, 2349758b77fSLuigi Rizzo { "aarp", 0x80f3 }, 2359758b77fSLuigi Rizzo { "pppoe_disc", 0x8863 }, 2369758b77fSLuigi Rizzo { "pppoe_sess", 0x8864 }, 2379758b77fSLuigi Rizzo { "ipx_8022", 0x00E0 }, 2389758b77fSLuigi Rizzo { "ipx_8023", 0x0000 }, 2399758b77fSLuigi Rizzo { "ipx_ii", 0x8137 }, 2409758b77fSLuigi Rizzo { "ipx_snap", 0x8137 }, 2419758b77fSLuigi Rizzo { "ipx", 0x8137 }, 2429758b77fSLuigi Rizzo { "ns", 0x0600 }, 2439758b77fSLuigi Rizzo { NULL, 0 } 2449758b77fSLuigi Rizzo }; 2459758b77fSLuigi Rizzo 2462acdf79fSAndrey V. Elsukov static struct _s_x rule_eactions[] = { 2475c04f73eSAndrey V. Elsukov { "nat64clat", TOK_NAT64CLAT }, 248d8caf56eSAndrey V. Elsukov { "nat64lsn", TOK_NAT64LSN }, 249d8caf56eSAndrey V. Elsukov { "nat64stl", TOK_NAT64STL }, 250b867e84eSAndrey V. Elsukov { "nptv6", TOK_NPTV6 }, 251aac74aeaSAndrey V. Elsukov { "tcp-setmss", TOK_TCPSETMSS }, 2522acdf79fSAndrey V. Elsukov { NULL, 0 } /* terminator */ 2532acdf79fSAndrey V. Elsukov }; 2549758b77fSLuigi Rizzo 2554e9c8ae7SLuigi Rizzo static struct _s_x rule_actions[] = { 256665c8a2eSMichael Tuexen { "abort6", TOK_ABORT6 }, 257665c8a2eSMichael Tuexen { "abort", TOK_ABORT }, 2589758b77fSLuigi Rizzo { "accept", TOK_ACCEPT }, 2599758b77fSLuigi Rizzo { "pass", TOK_ACCEPT }, 2609758b77fSLuigi Rizzo { "allow", TOK_ACCEPT }, 2619758b77fSLuigi Rizzo { "permit", TOK_ACCEPT }, 2629758b77fSLuigi Rizzo { "count", TOK_COUNT }, 2639758b77fSLuigi Rizzo { "pipe", TOK_PIPE }, 2649758b77fSLuigi Rizzo { "queue", TOK_QUEUE }, 2659758b77fSLuigi Rizzo { "divert", TOK_DIVERT }, 2669758b77fSLuigi Rizzo { "tee", TOK_TEE }, 267670742a1SGleb Smirnoff { "netgraph", TOK_NETGRAPH }, 268670742a1SGleb Smirnoff { "ngtee", TOK_NGTEE }, 2699758b77fSLuigi Rizzo { "fwd", TOK_FORWARD }, 2709758b77fSLuigi Rizzo { "forward", TOK_FORWARD }, 2719758b77fSLuigi Rizzo { "skipto", TOK_SKIPTO }, 2729758b77fSLuigi Rizzo { "deny", TOK_DENY }, 2739758b77fSLuigi Rizzo { "drop", TOK_DENY }, 2749758b77fSLuigi Rizzo { "reject", TOK_REJECT }, 2759066356bSBjoern A. Zeeb { "reset6", TOK_RESET6 }, 2769758b77fSLuigi Rizzo { "reset", TOK_RESET }, 2779066356bSBjoern A. Zeeb { "unreach6", TOK_UNREACH6 }, 2785e43aef8SLuigi Rizzo { "unreach", TOK_UNREACH }, 2799758b77fSLuigi Rizzo { "check-state", TOK_CHECKSTATE }, 28062ff38aeSLuigi Rizzo { "//", TOK_COMMENT }, 281ff2f6fe8SPaolo Pisati { "nat", TOK_NAT }, 282eb2e4119SPaolo Pisati { "reass", TOK_REASS }, 2838b07e49aSJulian Elischer { "setfib", TOK_SETFIB }, 284ae01d73cSAlexander V. Chernikov { "setdscp", TOK_SETDSCP }, 2859527ec6eSAndrey V. Elsukov { "call", TOK_CALL }, 2869527ec6eSAndrey V. Elsukov { "return", TOK_RETURN }, 2872acdf79fSAndrey V. Elsukov { "eaction", TOK_EACTION }, 288aac74aeaSAndrey V. Elsukov { "tcp-setmss", TOK_TCPSETMSS }, 289fc727ad6SBoris Lytochkin { "setmark", TOK_SETMARK }, 290571f8c1bSLuigi Rizzo { NULL, 0 } /* terminator */ 2919758b77fSLuigi Rizzo }; 2929758b77fSLuigi Rizzo 2934e9c8ae7SLuigi Rizzo static struct _s_x rule_action_params[] = { 294974dfe30SBrian Feldman { "altq", TOK_ALTQ }, 295974dfe30SBrian Feldman { "log", TOK_LOG }, 2966a7d5cb6SOleg Bulyzhin { "tag", TOK_TAG }, 2976a7d5cb6SOleg Bulyzhin { "untag", TOK_UNTAG }, 298974dfe30SBrian Feldman { NULL, 0 } /* terminator */ 299974dfe30SBrian Feldman }; 300974dfe30SBrian Feldman 301472099c4SLuigi Rizzo /* 302472099c4SLuigi Rizzo * The 'lookup' instruction accepts one of the following arguments. 303472099c4SLuigi Rizzo * Arguments are passed as v[1] in O_DST_LOOKUP options. 304472099c4SLuigi Rizzo */ 30581cac390SArseny Smalyuk static struct _s_x lookup_keys[] = { 30681cac390SArseny Smalyuk { "dst-ip", LOOKUP_DST_IP }, 30781cac390SArseny Smalyuk { "src-ip", LOOKUP_SRC_IP }, 30881cac390SArseny Smalyuk { "dst-port", LOOKUP_DST_PORT }, 30981cac390SArseny Smalyuk { "src-port", LOOKUP_SRC_PORT }, 31081cac390SArseny Smalyuk { "dst-mac", LOOKUP_DST_MAC }, 31181cac390SArseny Smalyuk { "src-mac", LOOKUP_SRC_MAC }, 31281cac390SArseny Smalyuk { "uid", LOOKUP_UID }, 31381cac390SArseny Smalyuk { "jail", LOOKUP_JAIL }, 31481cac390SArseny Smalyuk { "dscp", LOOKUP_DSCP }, 315fc727ad6SBoris Lytochkin { "mark", LOOKUP_MARK }, 31681cac390SArseny Smalyuk { NULL, 0 }, 31781cac390SArseny Smalyuk }; 318472099c4SLuigi Rizzo 3194e9c8ae7SLuigi Rizzo static struct _s_x rule_options[] = { 3206a7d5cb6SOleg Bulyzhin { "tagged", TOK_TAGGED }, 3219758b77fSLuigi Rizzo { "uid", TOK_UID }, 3229758b77fSLuigi Rizzo { "gid", TOK_GID }, 32331c88a30SChristian S.J. Peron { "jail", TOK_JAIL }, 3249758b77fSLuigi Rizzo { "in", TOK_IN }, 3259758b77fSLuigi Rizzo { "limit", TOK_LIMIT }, 326f7c4fdeeSAndrey V. Elsukov { "set-limit", TOK_SETLIMIT }, 3279758b77fSLuigi Rizzo { "keep-state", TOK_KEEPSTATE }, 328f7c4fdeeSAndrey V. Elsukov { "record-state", TOK_RECORDSTATE }, 3299758b77fSLuigi Rizzo { "bridged", TOK_LAYER2 }, 3309758b77fSLuigi Rizzo { "layer2", TOK_LAYER2 }, 3319758b77fSLuigi Rizzo { "out", TOK_OUT }, 3326daf7ebdSBrian Feldman { "diverted", TOK_DIVERTED }, 3336daf7ebdSBrian Feldman { "diverted-loopback", TOK_DIVERTEDLOOPBACK }, 3346daf7ebdSBrian Feldman { "diverted-output", TOK_DIVERTEDOUTPUT }, 3359758b77fSLuigi Rizzo { "xmit", TOK_XMIT }, 3369758b77fSLuigi Rizzo { "recv", TOK_RECV }, 3379758b77fSLuigi Rizzo { "via", TOK_VIA }, 3389758b77fSLuigi Rizzo { "fragment", TOK_FRAG }, 3399758b77fSLuigi Rizzo { "frag", TOK_FRAG }, 3408b07e49aSJulian Elischer { "fib", TOK_FIB }, 3419758b77fSLuigi Rizzo { "ipoptions", TOK_IPOPTS }, 3429758b77fSLuigi Rizzo { "ipopts", TOK_IPOPTS }, 3439758b77fSLuigi Rizzo { "iplen", TOK_IPLEN }, 3449758b77fSLuigi Rizzo { "ipid", TOK_IPID }, 3459758b77fSLuigi Rizzo { "ipprecedence", TOK_IPPRECEDENCE }, 34672662a75SLuigi Rizzo { "dscp", TOK_DSCP }, 3479758b77fSLuigi Rizzo { "iptos", TOK_IPTOS }, 3489758b77fSLuigi Rizzo { "ipttl", TOK_IPTTL }, 3499758b77fSLuigi Rizzo { "ipversion", TOK_IPVER }, 3509758b77fSLuigi Rizzo { "ipver", TOK_IPVER }, 3519758b77fSLuigi Rizzo { "estab", TOK_ESTAB }, 3529758b77fSLuigi Rizzo { "established", TOK_ESTAB }, 3539758b77fSLuigi Rizzo { "setup", TOK_SETUP }, 354ae99fd0eSLuigi Rizzo { "sockarg", TOK_SOCKARG }, 355c99ee9e0SBrian Feldman { "tcpdatalen", TOK_TCPDATALEN }, 3569758b77fSLuigi Rizzo { "tcpflags", TOK_TCPFLAGS }, 3579758b77fSLuigi Rizzo { "tcpflgs", TOK_TCPFLAGS }, 358978f2d17SAndrey V. Elsukov { "tcpmss", TOK_TCPMSS }, 3599758b77fSLuigi Rizzo { "tcpoptions", TOK_TCPOPTS }, 3609758b77fSLuigi Rizzo { "tcpopts", TOK_TCPOPTS }, 3619758b77fSLuigi Rizzo { "tcpseq", TOK_TCPSEQ }, 3629758b77fSLuigi Rizzo { "tcpack", TOK_TCPACK }, 3639758b77fSLuigi Rizzo { "tcpwin", TOK_TCPWIN }, 3640a7197a8SLuigi Rizzo { "icmptype", TOK_ICMPTYPES }, 3659758b77fSLuigi Rizzo { "icmptypes", TOK_ICMPTYPES }, 366e706181bSLuigi Rizzo { "dst-ip", TOK_DSTIP }, 367e706181bSLuigi Rizzo { "src-ip", TOK_SRCIP }, 368e706181bSLuigi Rizzo { "dst-port", TOK_DSTPORT }, 369e706181bSLuigi Rizzo { "src-port", TOK_SRCPORT }, 37081cac390SArseny Smalyuk { "dst-mac", TOK_DSTMAC }, 37181cac390SArseny Smalyuk { "src-mac", TOK_SRCMAC }, 372e706181bSLuigi Rizzo { "proto", TOK_PROTO }, 373e706181bSLuigi Rizzo { "MAC", TOK_MAC }, 374e706181bSLuigi Rizzo { "mac", TOK_MAC }, 375e706181bSLuigi Rizzo { "mac-type", TOK_MACTYPE }, 376010dabb0SCrist J. Clark { "verrevpath", TOK_VERREVPATH }, 37722b5770bSAndre Oppermann { "versrcreach", TOK_VERSRCREACH }, 3785f9541ecSAndre Oppermann { "antispoof", TOK_ANTISPOOF }, 379c3e5b9f1SLuigi Rizzo { "ipsec", TOK_IPSEC }, 3808195404bSBrooks Davis { "icmp6type", TOK_ICMP6TYPES }, 3818195404bSBrooks Davis { "icmp6types", TOK_ICMP6TYPES }, 3828195404bSBrooks Davis { "ext6hdr", TOK_EXT6HDR }, 3838195404bSBrooks Davis { "flow-id", TOK_FLOWID }, 3848195404bSBrooks Davis { "ipv6", TOK_IPV6 }, 3858195404bSBrooks Davis { "ip6", TOK_IPV6 }, 38657cd6d26SMax Laier { "ipv4", TOK_IPV4 }, 38757cd6d26SMax Laier { "ip4", TOK_IPV4 }, 3888195404bSBrooks Davis { "dst-ipv6", TOK_DSTIP6 }, 3898195404bSBrooks Davis { "dst-ip6", TOK_DSTIP6 }, 3908195404bSBrooks Davis { "src-ipv6", TOK_SRCIP6 }, 3918195404bSBrooks Davis { "src-ip6", TOK_SRCIP6 }, 392472099c4SLuigi Rizzo { "lookup", TOK_LOOKUP }, 393914bffb6SAlexander V. Chernikov { "flow", TOK_FLOW }, 394fc727ad6SBoris Lytochkin { "mark", TOK_MARK }, 395f7c4fdeeSAndrey V. Elsukov { "defer-action", TOK_SKIPACTION }, 396f7c4fdeeSAndrey V. Elsukov { "defer-immediate-action", TOK_SKIPACTION }, 39762ff38aeSLuigi Rizzo { "//", TOK_COMMENT }, 3989758b77fSLuigi Rizzo 3999758b77fSLuigi Rizzo { "not", TOK_NOT }, /* pseudo option */ 4009758b77fSLuigi Rizzo { "!", /* escape ? */ TOK_NOT }, /* pseudo option */ 4019758b77fSLuigi Rizzo { "or", TOK_OR }, /* pseudo option */ 4029758b77fSLuigi Rizzo { "|", /* escape */ TOK_OR }, /* pseudo option */ 4038ed2d749SLuigi Rizzo { "{", TOK_STARTBRACE }, /* pseudo option */ 4048ed2d749SLuigi Rizzo { "(", TOK_STARTBRACE }, /* pseudo option */ 4058ed2d749SLuigi Rizzo { "}", TOK_ENDBRACE }, /* pseudo option */ 4068ed2d749SLuigi Rizzo { ")", TOK_ENDBRACE }, /* pseudo option */ 407571f8c1bSLuigi Rizzo { NULL, 0 } /* terminator */ 4089758b77fSLuigi Rizzo }; 4099758b77fSLuigi Rizzo 410563b5ab1SAlexander V. Chernikov void bprint_uint_arg(struct buf_pr *bp, const char *str, uint32_t arg); 4112aa75134SAlexander V. Chernikov static int ipfw_get_config(struct cmdline_opts *co, struct format_opts *fo, 412563b5ab1SAlexander V. Chernikov ipfw_cfg_lheader **pcfg, size_t *psize); 413563b5ab1SAlexander V. Chernikov static int ipfw_show_config(struct cmdline_opts *co, struct format_opts *fo, 414563b5ab1SAlexander V. Chernikov ipfw_cfg_lheader *cfg, size_t sz, int ac, char **av); 415358b9d09SAlexander V. Chernikov static void ipfw_list_tifaces(void); 416563b5ab1SAlexander V. Chernikov 4178963c505SAlexander V. Chernikov struct tidx; 41856707beeSMark Johnston static uint16_t pack_object(struct tidx *tstate, const char *name, int otype); 41956707beeSMark Johnston static uint16_t pack_table(struct tidx *tstate, const char *name); 4208963c505SAlexander V. Chernikov 4218963c505SAlexander V. Chernikov static char *table_search_ctlv(ipfw_obj_ctlv *ctlv, uint16_t idx); 4228963c505SAlexander V. Chernikov static void object_sort_ctlv(ipfw_obj_ctlv *ctlv); 4232acdf79fSAndrey V. Elsukov static char *object_search_ctlv(ipfw_obj_ctlv *ctlv, uint16_t idx, 4242acdf79fSAndrey V. Elsukov uint16_t type); 4258963c505SAlexander V. Chernikov 4260b95680eSKristof Provost int 4270b95680eSKristof Provost is_ipfw(void) 4280b95680eSKristof Provost { 4290b95680eSKristof Provost return (g_co.prog == cmdline_prog_ipfw); 4300b95680eSKristof Provost } 4310b95680eSKristof Provost 432563b5ab1SAlexander V. Chernikov /* 433563b5ab1SAlexander V. Chernikov * Simple string buffer API. 434563b5ab1SAlexander V. Chernikov * Used to simplify buffer passing between function and for 435563b5ab1SAlexander V. Chernikov * transparent overrun handling. 436563b5ab1SAlexander V. Chernikov */ 437563b5ab1SAlexander V. Chernikov 438563b5ab1SAlexander V. Chernikov /* 439563b5ab1SAlexander V. Chernikov * Allocates new buffer of given size @sz. 440563b5ab1SAlexander V. Chernikov * 441563b5ab1SAlexander V. Chernikov * Returns 0 on success. 442563b5ab1SAlexander V. Chernikov */ 443563b5ab1SAlexander V. Chernikov int 444563b5ab1SAlexander V. Chernikov bp_alloc(struct buf_pr *b, size_t size) 445563b5ab1SAlexander V. Chernikov { 446563b5ab1SAlexander V. Chernikov memset(b, 0, sizeof(struct buf_pr)); 447563b5ab1SAlexander V. Chernikov 448563b5ab1SAlexander V. Chernikov if ((b->buf = calloc(1, size)) == NULL) 449563b5ab1SAlexander V. Chernikov return (ENOMEM); 450563b5ab1SAlexander V. Chernikov 451563b5ab1SAlexander V. Chernikov b->ptr = b->buf; 452563b5ab1SAlexander V. Chernikov b->size = size; 453563b5ab1SAlexander V. Chernikov b->avail = b->size; 454563b5ab1SAlexander V. Chernikov 455563b5ab1SAlexander V. Chernikov return (0); 456563b5ab1SAlexander V. Chernikov } 457563b5ab1SAlexander V. Chernikov 458563b5ab1SAlexander V. Chernikov void 459563b5ab1SAlexander V. Chernikov bp_free(struct buf_pr *b) 460563b5ab1SAlexander V. Chernikov { 461563b5ab1SAlexander V. Chernikov 462563b5ab1SAlexander V. Chernikov free(b->buf); 463563b5ab1SAlexander V. Chernikov } 464563b5ab1SAlexander V. Chernikov 465563b5ab1SAlexander V. Chernikov /* 466563b5ab1SAlexander V. Chernikov * Flushes buffer so new writer start from beginning. 467563b5ab1SAlexander V. Chernikov */ 468563b5ab1SAlexander V. Chernikov void 469563b5ab1SAlexander V. Chernikov bp_flush(struct buf_pr *b) 470563b5ab1SAlexander V. Chernikov { 471563b5ab1SAlexander V. Chernikov 472563b5ab1SAlexander V. Chernikov b->ptr = b->buf; 473563b5ab1SAlexander V. Chernikov b->avail = b->size; 4747aee4940SAndrey V. Elsukov b->buf[0] = '\0'; 475563b5ab1SAlexander V. Chernikov } 476563b5ab1SAlexander V. Chernikov 477563b5ab1SAlexander V. Chernikov /* 478563b5ab1SAlexander V. Chernikov * Print message specified by @format and args. 479563b5ab1SAlexander V. Chernikov * Automatically manage buffer space and transparently handle 480563b5ab1SAlexander V. Chernikov * buffer overruns. 481563b5ab1SAlexander V. Chernikov * 482563b5ab1SAlexander V. Chernikov * Returns number of bytes that should have been printed. 483563b5ab1SAlexander V. Chernikov */ 484563b5ab1SAlexander V. Chernikov int 48556707beeSMark Johnston bprintf(struct buf_pr *b, const char *format, ...) 486563b5ab1SAlexander V. Chernikov { 487563b5ab1SAlexander V. Chernikov va_list args; 488563b5ab1SAlexander V. Chernikov int i; 489563b5ab1SAlexander V. Chernikov 490563b5ab1SAlexander V. Chernikov va_start(args, format); 491563b5ab1SAlexander V. Chernikov 492563b5ab1SAlexander V. Chernikov i = vsnprintf(b->ptr, b->avail, format, args); 493563b5ab1SAlexander V. Chernikov va_end(args); 494563b5ab1SAlexander V. Chernikov 49556707beeSMark Johnston if (i < 0 || (size_t)i > b->avail) { 496563b5ab1SAlexander V. Chernikov /* Overflow or print error */ 497563b5ab1SAlexander V. Chernikov b->avail = 0; 498563b5ab1SAlexander V. Chernikov } else { 499563b5ab1SAlexander V. Chernikov b->ptr += i; 500563b5ab1SAlexander V. Chernikov b->avail -= i; 501563b5ab1SAlexander V. Chernikov } 502563b5ab1SAlexander V. Chernikov 503563b5ab1SAlexander V. Chernikov b->needed += i; 504563b5ab1SAlexander V. Chernikov 505563b5ab1SAlexander V. Chernikov return (i); 506563b5ab1SAlexander V. Chernikov } 507563b5ab1SAlexander V. Chernikov 508563b5ab1SAlexander V. Chernikov /* 509563b5ab1SAlexander V. Chernikov * Special values printer for tablearg-aware opcodes. 510563b5ab1SAlexander V. Chernikov */ 511563b5ab1SAlexander V. Chernikov void 512563b5ab1SAlexander V. Chernikov bprint_uint_arg(struct buf_pr *bp, const char *str, uint32_t arg) 513563b5ab1SAlexander V. Chernikov { 514563b5ab1SAlexander V. Chernikov 515563b5ab1SAlexander V. Chernikov if (str != NULL) 516563b5ab1SAlexander V. Chernikov bprintf(bp, "%s", str); 5171940fa77SAlexander V. Chernikov if (arg == IP_FW_TARG) 518563b5ab1SAlexander V. Chernikov bprintf(bp, "tablearg"); 519563b5ab1SAlexander V. Chernikov else 520563b5ab1SAlexander V. Chernikov bprintf(bp, "%u", arg); 521563b5ab1SAlexander V. Chernikov } 522563b5ab1SAlexander V. Chernikov 52350a99912SLuigi Rizzo /* 52437133ba7SLuigi Rizzo * Helper routine to print a possibly unaligned uint64_t on 52537133ba7SLuigi Rizzo * various platform. If width > 0, print the value with 52637133ba7SLuigi Rizzo * the desired width, followed by a space; 52737133ba7SLuigi Rizzo * otherwise, return the required width. 52850a99912SLuigi Rizzo */ 52937133ba7SLuigi Rizzo int 530165236a1SMark Johnston pr_u64(struct buf_pr *b, void *pd, int width) 53150a99912SLuigi Rizzo { 53237133ba7SLuigi Rizzo #ifdef TCC 53337133ba7SLuigi Rizzo #define U64_FMT "I64" 53437133ba7SLuigi Rizzo #else 53537133ba7SLuigi Rizzo #define U64_FMT "llu" 53637133ba7SLuigi Rizzo #endif 537d55ebfbdSLuigi Rizzo uint64_t u; 538d55ebfbdSLuigi Rizzo unsigned long long d; 539330462a3SBernd Walter 540d55ebfbdSLuigi Rizzo bcopy (pd, &u, sizeof(u)); 541d55ebfbdSLuigi Rizzo d = u; 54237133ba7SLuigi Rizzo return (width > 0) ? 543563b5ab1SAlexander V. Chernikov bprintf(b, "%*" U64_FMT " ", width, d) : 54437133ba7SLuigi Rizzo snprintf(NULL, 0, "%" U64_FMT, d) ; 54537133ba7SLuigi Rizzo #undef U64_FMT 546c85c1d27SStefan Farfeleder } 547330462a3SBernd Walter 548563b5ab1SAlexander V. Chernikov 5493c0c8717SLuigi Rizzo void * 5505f356082SLuigi Rizzo safe_calloc(size_t number, size_t size) 5515f356082SLuigi Rizzo { 5525f356082SLuigi Rizzo void *ret = calloc(number, size); 5535f356082SLuigi Rizzo 5545f356082SLuigi Rizzo if (ret == NULL) 5555f356082SLuigi Rizzo err(EX_OSERR, "calloc"); 5565f356082SLuigi Rizzo return ret; 5575f356082SLuigi Rizzo } 5585f356082SLuigi Rizzo 5593c0c8717SLuigi Rizzo void * 5605f356082SLuigi Rizzo safe_realloc(void *ptr, size_t size) 5615f356082SLuigi Rizzo { 5625f356082SLuigi Rizzo void *ret = realloc(ptr, size); 5635f356082SLuigi Rizzo 5645f356082SLuigi Rizzo if (ret == NULL) 5655f356082SLuigi Rizzo err(EX_OSERR, "realloc"); 5665f356082SLuigi Rizzo return ret; 5675f356082SLuigi Rizzo } 5685f356082SLuigi Rizzo 569571f8c1bSLuigi Rizzo /* 57068394ec8SAlexander V. Chernikov * Compare things like interface or table names. 57168394ec8SAlexander V. Chernikov */ 57268394ec8SAlexander V. Chernikov int 57368394ec8SAlexander V. Chernikov stringnum_cmp(const char *a, const char *b) 57468394ec8SAlexander V. Chernikov { 57568394ec8SAlexander V. Chernikov int la, lb; 57668394ec8SAlexander V. Chernikov 57768394ec8SAlexander V. Chernikov la = strlen(a); 57868394ec8SAlexander V. Chernikov lb = strlen(b); 57968394ec8SAlexander V. Chernikov 58068394ec8SAlexander V. Chernikov if (la > lb) 58168394ec8SAlexander V. Chernikov return (1); 58268394ec8SAlexander V. Chernikov else if (la < lb) 58368394ec8SAlexander V. Chernikov return (-01); 58468394ec8SAlexander V. Chernikov 58568394ec8SAlexander V. Chernikov return (strcmp(a, b)); 58668394ec8SAlexander V. Chernikov } 58768394ec8SAlexander V. Chernikov 5889f44a47fSAlexander V. Chernikov struct debug_header { 5899f44a47fSAlexander V. Chernikov uint16_t cmd_type; 5909f44a47fSAlexander V. Chernikov uint16_t spare1; 5919f44a47fSAlexander V. Chernikov uint32_t opt_name; 5929f44a47fSAlexander V. Chernikov uint32_t total_len; 5939f44a47fSAlexander V. Chernikov uint32_t spare2; 5949f44a47fSAlexander V. Chernikov }; 59568394ec8SAlexander V. Chernikov 59668394ec8SAlexander V. Chernikov /* 597571f8c1bSLuigi Rizzo * conditionally runs the command. 598cc4d3c30SLuigi Rizzo * Selected options or negative -> getsockopt 599571f8c1bSLuigi Rizzo */ 6004e9c8ae7SLuigi Rizzo int 601884be75cSThomas Moestl do_cmd(int optname, void *optval, uintptr_t optlen) 602571f8c1bSLuigi Rizzo { 603571f8c1bSLuigi Rizzo int i; 604571f8c1bSLuigi Rizzo 6059f44a47fSAlexander V. Chernikov if (g_co.debug_only) { 6069f44a47fSAlexander V. Chernikov struct debug_header dbg = { 6079f44a47fSAlexander V. Chernikov .cmd_type = 1, 6089f44a47fSAlexander V. Chernikov .opt_name = optname, 6099f44a47fSAlexander V. Chernikov .total_len = optlen + sizeof(struct debug_header), 6109f44a47fSAlexander V. Chernikov }; 6119f44a47fSAlexander V. Chernikov write(1, &dbg, sizeof(dbg)); 6129f44a47fSAlexander V. Chernikov write(1, optval, optlen); 6139f44a47fSAlexander V. Chernikov } 6149f44a47fSAlexander V. Chernikov 61556707beeSMark Johnston if (g_co.test_only) 6169f44a47fSAlexander V. Chernikov return (0); 617571f8c1bSLuigi Rizzo 618f8bee51aSAlexander V. Chernikov if (ipfw_socket == -1) 619f8bee51aSAlexander V. Chernikov ipfw_socket = socket(AF_INET, SOCK_RAW, IPPROTO_RAW); 620f8bee51aSAlexander V. Chernikov if (ipfw_socket < 0) 621571f8c1bSLuigi Rizzo err(EX_UNAVAILABLE, "socket"); 622571f8c1bSLuigi Rizzo 623571f8c1bSLuigi Rizzo if (optname == IP_FW_GET || optname == IP_DUMMYNET_GET || 624f8bee51aSAlexander V. Chernikov optname == IP_FW_ADD || optname == IP_FW3 || 625ff2f6fe8SPaolo Pisati optname == IP_FW_NAT_GET_CONFIG || 626cc4d3c30SLuigi Rizzo optname < 0 || 627cc4d3c30SLuigi Rizzo optname == IP_FW_NAT_GET_LOG) { 628cc4d3c30SLuigi Rizzo if (optname < 0) 629cc4d3c30SLuigi Rizzo optname = -optname; 630f8bee51aSAlexander V. Chernikov i = getsockopt(ipfw_socket, IPPROTO_IP, optname, optval, 631571f8c1bSLuigi Rizzo (socklen_t *)optlen); 632cc4d3c30SLuigi Rizzo } else { 633f8bee51aSAlexander V. Chernikov i = setsockopt(ipfw_socket, IPPROTO_IP, optname, optval, optlen); 634cc4d3c30SLuigi Rizzo } 6359f44a47fSAlexander V. Chernikov return (i); 636571f8c1bSLuigi Rizzo } 637571f8c1bSLuigi Rizzo 638f8bee51aSAlexander V. Chernikov /* 6399f7d47b0SAlexander V. Chernikov * do_set3 - pass ipfw control cmd to kernel 6409f7d47b0SAlexander V. Chernikov * @optname: option name 6419f7d47b0SAlexander V. Chernikov * @optval: pointer to option data 6429f7d47b0SAlexander V. Chernikov * @optlen: option length 6439f7d47b0SAlexander V. Chernikov * 6449f7d47b0SAlexander V. Chernikov * Assumes op3 header is already embedded. 6459f7d47b0SAlexander V. Chernikov * Calls setsockopt() with IP_FW3 as kernel-visible opcode. 6464c0c07a5SAlexander V. Chernikov * Returns 0 on success or errno otherwise. 6479f7d47b0SAlexander V. Chernikov */ 648f1220db8SAlexander V. Chernikov int 6496d3c367dSMarius Strobl do_set3(int optname, ip_fw3_opheader *op3, size_t optlen) 6509f7d47b0SAlexander V. Chernikov { 6519f7d47b0SAlexander V. Chernikov 6529f44a47fSAlexander V. Chernikov op3->opcode = optname; 6539f44a47fSAlexander V. Chernikov 6549f44a47fSAlexander V. Chernikov if (g_co.debug_only) { 6559f44a47fSAlexander V. Chernikov struct debug_header dbg = { 6569f44a47fSAlexander V. Chernikov .cmd_type = 2, 6579f44a47fSAlexander V. Chernikov .opt_name = optname, 6589f44a47fSAlexander V. Chernikov .total_len = optlen, sizeof(struct debug_header), 6599f44a47fSAlexander V. Chernikov }; 6609f44a47fSAlexander V. Chernikov write(1, &dbg, sizeof(dbg)); 6619f44a47fSAlexander V. Chernikov write(1, op3, optlen); 6629f44a47fSAlexander V. Chernikov } 6639f44a47fSAlexander V. Chernikov 66456707beeSMark Johnston if (g_co.test_only) 6659f7d47b0SAlexander V. Chernikov return (0); 6669f7d47b0SAlexander V. Chernikov 6679f7d47b0SAlexander V. Chernikov if (ipfw_socket == -1) 6689f7d47b0SAlexander V. Chernikov ipfw_socket = socket(AF_INET, SOCK_RAW, IPPROTO_RAW); 6699f7d47b0SAlexander V. Chernikov if (ipfw_socket < 0) 6709f7d47b0SAlexander V. Chernikov err(EX_UNAVAILABLE, "socket"); 6719f7d47b0SAlexander V. Chernikov 6729f7d47b0SAlexander V. Chernikov 67377798796SAlexander V. Chernikov return (setsockopt(ipfw_socket, IPPROTO_IP, IP_FW3, op3, optlen)); 6749f7d47b0SAlexander V. Chernikov } 6759f7d47b0SAlexander V. Chernikov 676f18a707eSAlexander V. Chernikov /* 677f18a707eSAlexander V. Chernikov * do_get3 - pass ipfw control cmd to kernel 678f18a707eSAlexander V. Chernikov * @optname: option name 679f18a707eSAlexander V. Chernikov * @optval: pointer to option data 680f18a707eSAlexander V. Chernikov * @optlen: pointer to option length 681f18a707eSAlexander V. Chernikov * 682f18a707eSAlexander V. Chernikov * Assumes op3 header is already embedded. 683f18a707eSAlexander V. Chernikov * Calls getsockopt() with IP_FW3 as kernel-visible opcode. 684f18a707eSAlexander V. Chernikov * Returns 0 on success or errno otherwise. 685f18a707eSAlexander V. Chernikov */ 686f1220db8SAlexander V. Chernikov int 687f1220db8SAlexander V. Chernikov do_get3(int optname, ip_fw3_opheader *op3, size_t *optlen) 688f1220db8SAlexander V. Chernikov { 689f1220db8SAlexander V. Chernikov int error; 6906d3c367dSMarius Strobl socklen_t len; 691f1220db8SAlexander V. Chernikov 6929f44a47fSAlexander V. Chernikov op3->opcode = optname; 6939f44a47fSAlexander V. Chernikov 6949f44a47fSAlexander V. Chernikov if (g_co.debug_only) { 6959f44a47fSAlexander V. Chernikov struct debug_header dbg = { 6969f44a47fSAlexander V. Chernikov .cmd_type = 3, 6979f44a47fSAlexander V. Chernikov .opt_name = optname, 6989f44a47fSAlexander V. Chernikov .total_len = *optlen + sizeof(struct debug_header), 6999f44a47fSAlexander V. Chernikov }; 7009f44a47fSAlexander V. Chernikov write(1, &dbg, sizeof(dbg)); 7019f44a47fSAlexander V. Chernikov write(1, op3, *optlen); 7029f44a47fSAlexander V. Chernikov } 7039f44a47fSAlexander V. Chernikov 70456707beeSMark Johnston if (g_co.test_only) 705f1220db8SAlexander V. Chernikov return (0); 706f1220db8SAlexander V. Chernikov 707f1220db8SAlexander V. Chernikov if (ipfw_socket == -1) 708f1220db8SAlexander V. Chernikov ipfw_socket = socket(AF_INET, SOCK_RAW, IPPROTO_RAW); 709f1220db8SAlexander V. Chernikov if (ipfw_socket < 0) 710f1220db8SAlexander V. Chernikov err(EX_UNAVAILABLE, "socket"); 711f1220db8SAlexander V. Chernikov 712f1220db8SAlexander V. Chernikov 7136d3c367dSMarius Strobl len = *optlen; 7146d3c367dSMarius Strobl error = getsockopt(ipfw_socket, IPPROTO_IP, IP_FW3, op3, &len); 7156d3c367dSMarius Strobl *optlen = len; 716f1220db8SAlexander V. Chernikov 717f1220db8SAlexander V. Chernikov return (error); 718f1220db8SAlexander V. Chernikov } 719f1220db8SAlexander V. Chernikov 7209758b77fSLuigi Rizzo /** 7219758b77fSLuigi Rizzo * match_token takes a table and a string, returns the value associated 722571f8c1bSLuigi Rizzo * with the string (-1 in case of failure). 7239758b77fSLuigi Rizzo */ 7244e9c8ae7SLuigi Rizzo int 7252acdf79fSAndrey V. Elsukov match_token(struct _s_x *table, const char *string) 7269758b77fSLuigi Rizzo { 7279758b77fSLuigi Rizzo struct _s_x *pt; 72862ff38aeSLuigi Rizzo uint i = strlen(string); 7299758b77fSLuigi Rizzo 7309758b77fSLuigi Rizzo for (pt = table ; i && pt->s != NULL ; pt++) 7319758b77fSLuigi Rizzo if (strlen(pt->s) == i && !bcmp(string, pt->s, i)) 7329758b77fSLuigi Rizzo return pt->x; 733ac35ff17SAlexander V. Chernikov return (-1); 734c85c1d27SStefan Farfeleder } 7359758b77fSLuigi Rizzo 736571f8c1bSLuigi Rizzo /** 7372acdf79fSAndrey V. Elsukov * match_token_relaxed takes a table and a string, returns the value associated 738be695df9SAlexander V. Chernikov * with the string for the best match. 739be695df9SAlexander V. Chernikov * 740be695df9SAlexander V. Chernikov * Returns: 741be695df9SAlexander V. Chernikov * value from @table for matched records 742be695df9SAlexander V. Chernikov * -1 for non-matched records 743be695df9SAlexander V. Chernikov * -2 if more than one records match @string. 744be695df9SAlexander V. Chernikov */ 745be695df9SAlexander V. Chernikov int 7462acdf79fSAndrey V. Elsukov match_token_relaxed(struct _s_x *table, const char *string) 747be695df9SAlexander V. Chernikov { 748be695df9SAlexander V. Chernikov struct _s_x *pt, *m; 749be695df9SAlexander V. Chernikov int i, c; 750be695df9SAlexander V. Chernikov 751be695df9SAlexander V. Chernikov i = strlen(string); 752be695df9SAlexander V. Chernikov c = 0; 753be695df9SAlexander V. Chernikov 754be695df9SAlexander V. Chernikov for (pt = table ; i != 0 && pt->s != NULL ; pt++) { 755be695df9SAlexander V. Chernikov if (strncmp(pt->s, string, i) != 0) 756be695df9SAlexander V. Chernikov continue; 757be695df9SAlexander V. Chernikov m = pt; 758be695df9SAlexander V. Chernikov c++; 759be695df9SAlexander V. Chernikov } 760be695df9SAlexander V. Chernikov 761be695df9SAlexander V. Chernikov if (c == 1) 762be695df9SAlexander V. Chernikov return (m->x); 763be695df9SAlexander V. Chernikov 764be695df9SAlexander V. Chernikov return (c > 0 ? -2: -1); 765be695df9SAlexander V. Chernikov } 766be695df9SAlexander V. Chernikov 7672acdf79fSAndrey V. Elsukov int 7682acdf79fSAndrey V. Elsukov get_token(struct _s_x *table, const char *string, const char *errbase) 7692acdf79fSAndrey V. Elsukov { 7702acdf79fSAndrey V. Elsukov int tcmd; 7712acdf79fSAndrey V. Elsukov 7722acdf79fSAndrey V. Elsukov if ((tcmd = match_token_relaxed(table, string)) < 0) 7732acdf79fSAndrey V. Elsukov errx(EX_USAGE, "%s %s %s", 7742acdf79fSAndrey V. Elsukov (tcmd == 0) ? "invalid" : "ambiguous", errbase, string); 7752acdf79fSAndrey V. Elsukov 7762acdf79fSAndrey V. Elsukov return (tcmd); 7772acdf79fSAndrey V. Elsukov } 7782acdf79fSAndrey V. Elsukov 779be695df9SAlexander V. Chernikov /** 780571f8c1bSLuigi Rizzo * match_value takes a table and a value, returns the string associated 781571f8c1bSLuigi Rizzo * with the value (NULL in case of failure). 782571f8c1bSLuigi Rizzo */ 783ead75a59SLuigi Rizzo char const * 78462ff38aeSLuigi Rizzo match_value(struct _s_x *p, int value) 7859758b77fSLuigi Rizzo { 7869758b77fSLuigi Rizzo for (; p->s != NULL; p++) 7879758b77fSLuigi Rizzo if (p->x == value) 7889758b77fSLuigi Rizzo return p->s; 7899758b77fSLuigi Rizzo return NULL; 7909758b77fSLuigi Rizzo } 7919758b77fSLuigi Rizzo 792ac35ff17SAlexander V. Chernikov size_t 79356707beeSMark Johnston concat_tokens(char *buf, size_t bufsize, struct _s_x *table, 79456707beeSMark Johnston const char *delimiter) 795ac35ff17SAlexander V. Chernikov { 796ac35ff17SAlexander V. Chernikov struct _s_x *pt; 797ac35ff17SAlexander V. Chernikov int l; 798ac35ff17SAlexander V. Chernikov size_t sz; 799ac35ff17SAlexander V. Chernikov 800ac35ff17SAlexander V. Chernikov for (sz = 0, pt = table ; pt->s != NULL; pt++) { 801ac35ff17SAlexander V. Chernikov l = snprintf(buf + sz, bufsize - sz, "%s%s", 802ac35ff17SAlexander V. Chernikov (sz == 0) ? "" : delimiter, pt->s); 803ac35ff17SAlexander V. Chernikov sz += l; 804ac35ff17SAlexander V. Chernikov bufsize += l; 805ac35ff17SAlexander V. Chernikov if (sz > bufsize) 806ac35ff17SAlexander V. Chernikov return (bufsize); 807ac35ff17SAlexander V. Chernikov } 808ac35ff17SAlexander V. Chernikov 809ac35ff17SAlexander V. Chernikov return (sz); 810ac35ff17SAlexander V. Chernikov } 811ac35ff17SAlexander V. Chernikov 8129758b77fSLuigi Rizzo /* 813914bffb6SAlexander V. Chernikov * helper function to process a set of flags and set bits in the 814914bffb6SAlexander V. Chernikov * appropriate masks. 815914bffb6SAlexander V. Chernikov */ 8160cba2b28SAlexander V. Chernikov int 8170cba2b28SAlexander V. Chernikov fill_flags(struct _s_x *flags, char *p, char **e, uint32_t *set, 8180cba2b28SAlexander V. Chernikov uint32_t *clear) 819914bffb6SAlexander V. Chernikov { 820914bffb6SAlexander V. Chernikov char *q; /* points to the separator */ 821914bffb6SAlexander V. Chernikov int val; 8220cba2b28SAlexander V. Chernikov uint32_t *which; /* mask we are working on */ 823914bffb6SAlexander V. Chernikov 824914bffb6SAlexander V. Chernikov while (p && *p) { 825914bffb6SAlexander V. Chernikov if (*p == '!') { 826914bffb6SAlexander V. Chernikov p++; 827914bffb6SAlexander V. Chernikov which = clear; 828914bffb6SAlexander V. Chernikov } else 829914bffb6SAlexander V. Chernikov which = set; 830914bffb6SAlexander V. Chernikov q = strchr(p, ','); 831914bffb6SAlexander V. Chernikov if (q) 832914bffb6SAlexander V. Chernikov *q++ = '\0'; 833914bffb6SAlexander V. Chernikov val = match_token(flags, p); 8340cba2b28SAlexander V. Chernikov if (val <= 0) { 8350cba2b28SAlexander V. Chernikov if (e != NULL) 8360cba2b28SAlexander V. Chernikov *e = p; 8370cba2b28SAlexander V. Chernikov return (-1); 8380cba2b28SAlexander V. Chernikov } 8390cba2b28SAlexander V. Chernikov *which |= (uint32_t)val; 840914bffb6SAlexander V. Chernikov p = q; 841914bffb6SAlexander V. Chernikov } 8420cba2b28SAlexander V. Chernikov return (0); 843914bffb6SAlexander V. Chernikov } 844914bffb6SAlexander V. Chernikov 845914bffb6SAlexander V. Chernikov void 8460cba2b28SAlexander V. Chernikov print_flags_buffer(char *buf, size_t sz, struct _s_x *list, uint32_t set) 847914bffb6SAlexander V. Chernikov { 848914bffb6SAlexander V. Chernikov char const *comma = ""; 849914bffb6SAlexander V. Chernikov int i, l; 850914bffb6SAlexander V. Chernikov 851914bffb6SAlexander V. Chernikov for (i = 0; list[i].x != 0; i++) { 852914bffb6SAlexander V. Chernikov if ((set & list[i].x) == 0) 853914bffb6SAlexander V. Chernikov continue; 854914bffb6SAlexander V. Chernikov 855914bffb6SAlexander V. Chernikov set &= ~list[i].x; 856914bffb6SAlexander V. Chernikov l = snprintf(buf, sz, "%s%s", comma, list[i].s); 85756707beeSMark Johnston if (l < 0 || (size_t)l >= sz) 858914bffb6SAlexander V. Chernikov return; 859914bffb6SAlexander V. Chernikov comma = ","; 860914bffb6SAlexander V. Chernikov buf += l; 861914bffb6SAlexander V. Chernikov sz -=l; 862914bffb6SAlexander V. Chernikov } 863914bffb6SAlexander V. Chernikov } 864914bffb6SAlexander V. Chernikov 865914bffb6SAlexander V. Chernikov /* 86601750186SBrooks Davis * _substrcmp takes two strings and returns 1 if they do not match, 86701750186SBrooks Davis * and 0 if they match exactly or the first string is a sub-string 86801750186SBrooks Davis * of the second. A warning is printed to stderr in the case that the 86901750186SBrooks Davis * first string is a sub-string of the second. 87001750186SBrooks Davis * 87101750186SBrooks Davis * This function will be removed in the future through the usual 87201750186SBrooks Davis * deprecation process. 87301750186SBrooks Davis */ 8743c0c8717SLuigi Rizzo int 87501750186SBrooks Davis _substrcmp(const char *str1, const char* str2) 87601750186SBrooks Davis { 87701750186SBrooks Davis 87801750186SBrooks Davis if (strncmp(str1, str2, strlen(str1)) != 0) 87901750186SBrooks Davis return 1; 88001750186SBrooks Davis 88101750186SBrooks Davis if (strlen(str1) != strlen(str2)) 88201750186SBrooks Davis warnx("DEPRECATED: '%s' matched '%s' as a sub-string", 88301750186SBrooks Davis str1, str2); 88401750186SBrooks Davis return 0; 88501750186SBrooks Davis } 88601750186SBrooks Davis 88701750186SBrooks Davis /* 88801750186SBrooks Davis * _substrcmp2 takes three strings and returns 1 if the first two do not match, 88901750186SBrooks Davis * and 0 if they match exactly or the second string is a sub-string 89001750186SBrooks Davis * of the first. A warning is printed to stderr in the case that the 89101750186SBrooks Davis * first string does not match the third. 89201750186SBrooks Davis * 8934b85a12fSUlrich Spörlein * This function exists to warn about the bizarre construction 8944b85a12fSUlrich Spörlein * strncmp(str, "by", 2) which is used to allow people to use a shortcut 89501750186SBrooks Davis * for "bytes". The problem is that in addition to accepting "by", 89601750186SBrooks Davis * "byt", "byte", and "bytes", it also excepts "by_rabid_dogs" and any 89701750186SBrooks Davis * other string beginning with "by". 89801750186SBrooks Davis * 89901750186SBrooks Davis * This function will be removed in the future through the usual 90001750186SBrooks Davis * deprecation process. 90101750186SBrooks Davis */ 9024e9c8ae7SLuigi Rizzo int 90301750186SBrooks Davis _substrcmp2(const char *str1, const char* str2, const char* str3) 90401750186SBrooks Davis { 90501750186SBrooks Davis 90601750186SBrooks Davis if (strncmp(str1, str2, strlen(str2)) != 0) 90701750186SBrooks Davis return 1; 90801750186SBrooks Davis 90901750186SBrooks Davis if (strcmp(str1, str3) != 0) 91001750186SBrooks Davis warnx("DEPRECATED: '%s' matched '%s'", 91101750186SBrooks Davis str1, str3); 91201750186SBrooks Davis return 0; 91301750186SBrooks Davis } 91401750186SBrooks Davis 91501750186SBrooks Davis /* 9169758b77fSLuigi Rizzo * prints one port, symbolic or numeric 9179758b77fSLuigi Rizzo */ 9189758b77fSLuigi Rizzo static void 9194df4dadaSAlexander V. Chernikov print_port(struct buf_pr *bp, int proto, uint16_t port) 9209758b77fSLuigi Rizzo { 9219758b77fSLuigi Rizzo 9229758b77fSLuigi Rizzo if (proto == IPPROTO_ETHERTYPE) { 92362ff38aeSLuigi Rizzo char const *s; 9249758b77fSLuigi Rizzo 92556707beeSMark Johnston if (g_co.do_resolv && (s = match_value(ether_types, port)) ) 9264df4dadaSAlexander V. Chernikov bprintf(bp, "%s", s); 9279758b77fSLuigi Rizzo else 9284df4dadaSAlexander V. Chernikov bprintf(bp, "0x%04x", port); 9299758b77fSLuigi Rizzo } else { 9309758b77fSLuigi Rizzo struct servent *se = NULL; 93156707beeSMark Johnston if (g_co.do_resolv) { 9329758b77fSLuigi Rizzo struct protoent *pe = getprotobynumber(proto); 9339758b77fSLuigi Rizzo 9349758b77fSLuigi Rizzo se = getservbyport(htons(port), pe ? pe->p_name : NULL); 9359758b77fSLuigi Rizzo } 9369758b77fSLuigi Rizzo if (se) 9374df4dadaSAlexander V. Chernikov bprintf(bp, "%s", se->s_name); 9389758b77fSLuigi Rizzo else 9394df4dadaSAlexander V. Chernikov bprintf(bp, "%d", port); 9409758b77fSLuigi Rizzo } 9419758b77fSLuigi Rizzo } 9429758b77fSLuigi Rizzo 9434e9c8ae7SLuigi Rizzo static struct _s_x _port_name[] = { 944571f8c1bSLuigi Rizzo {"dst-port", O_IP_DSTPORT}, 945571f8c1bSLuigi Rizzo {"src-port", O_IP_SRCPORT}, 946571f8c1bSLuigi Rizzo {"ipid", O_IPID}, 947571f8c1bSLuigi Rizzo {"iplen", O_IPLEN}, 948571f8c1bSLuigi Rizzo {"ipttl", O_IPTTL}, 949571f8c1bSLuigi Rizzo {"mac-type", O_MAC_TYPE}, 950c99ee9e0SBrian Feldman {"tcpdatalen", O_TCPDATALEN}, 951978f2d17SAndrey V. Elsukov {"tcpmss", O_TCPMSS}, 95223ccd3d9SGleb Smirnoff {"tcpwin", O_TCPWIN}, 9536a7d5cb6SOleg Bulyzhin {"tagged", O_TAGGED}, 954571f8c1bSLuigi Rizzo {NULL, 0} 955571f8c1bSLuigi Rizzo }; 956571f8c1bSLuigi Rizzo 9579758b77fSLuigi Rizzo /* 958571f8c1bSLuigi Rizzo * Print the values in a list 16-bit items of the types above. 9599758b77fSLuigi Rizzo * XXX todo: add support for mask. 9609758b77fSLuigi Rizzo */ 9619758b77fSLuigi Rizzo static void 96256707beeSMark Johnston print_newports(struct buf_pr *bp, const ipfw_insn_u16 *cmd, int proto, int opcode) 9639758b77fSLuigi Rizzo { 96456707beeSMark Johnston const uint16_t *p = cmd->ports; 9659758b77fSLuigi Rizzo int i; 96662ff38aeSLuigi Rizzo char const *sep; 9679758b77fSLuigi Rizzo 96844c884e1SLuigi Rizzo if (opcode != 0) { 969571f8c1bSLuigi Rizzo sep = match_value(_port_name, opcode); 970571f8c1bSLuigi Rizzo if (sep == NULL) 97144c884e1SLuigi Rizzo sep = "???"; 9724df4dadaSAlexander V. Chernikov bprintf(bp, " %s", sep); 97344c884e1SLuigi Rizzo } 97444c884e1SLuigi Rizzo sep = " "; 97556707beeSMark Johnston for (i = F_LEN((const ipfw_insn *)cmd) - 1; i > 0; i--, p += 2) { 9764df4dadaSAlexander V. Chernikov bprintf(bp, "%s", sep); 9774df4dadaSAlexander V. Chernikov print_port(bp, proto, p[0]); 9789758b77fSLuigi Rizzo if (p[0] != p[1]) { 9794df4dadaSAlexander V. Chernikov bprintf(bp, "-"); 9804df4dadaSAlexander V. Chernikov print_port(bp, proto, p[1]); 9819758b77fSLuigi Rizzo } 9829758b77fSLuigi Rizzo sep = ","; 9839758b77fSLuigi Rizzo } 9849758b77fSLuigi Rizzo } 9859758b77fSLuigi Rizzo 9869758b77fSLuigi Rizzo /* 9879758b77fSLuigi Rizzo * Like strtol, but also translates service names into port numbers 9889758b77fSLuigi Rizzo * for some protocols. 9899758b77fSLuigi Rizzo * In particular: 9909758b77fSLuigi Rizzo * proto == -1 disables the protocol check; 9919758b77fSLuigi Rizzo * proto == IPPROTO_ETHERTYPE looks up an internal table 9929758b77fSLuigi Rizzo * proto == <some value in /etc/protocols> matches the values there. 99343405724SLuigi Rizzo * Returns *end == s in case the parameter is not found. 9949758b77fSLuigi Rizzo */ 9959758b77fSLuigi Rizzo static int 9969758b77fSLuigi Rizzo strtoport(char *s, char **end, int base, int proto) 9979758b77fSLuigi Rizzo { 99843405724SLuigi Rizzo char *p, *buf; 99943405724SLuigi Rizzo char *s1; 10009758b77fSLuigi Rizzo int i; 10019758b77fSLuigi Rizzo 100243405724SLuigi Rizzo *end = s; /* default - not found */ 10039758b77fSLuigi Rizzo if (*s == '\0') 100443405724SLuigi Rizzo return 0; /* not found */ 10059758b77fSLuigi Rizzo 10069758b77fSLuigi Rizzo if (isdigit(*s)) 10079758b77fSLuigi Rizzo return strtol(s, end, base); 10089758b77fSLuigi Rizzo 10099758b77fSLuigi Rizzo /* 101043405724SLuigi Rizzo * find separator. '\\' escapes the next char. 10119758b77fSLuigi Rizzo */ 1012a5178bcaSAndrey V. Elsukov for (s1 = s; *s1 && (isalnum(*s1) || *s1 == '\\' || 1013a5178bcaSAndrey V. Elsukov *s1 == '_' || *s1 == '.') ; s1++) 101443405724SLuigi Rizzo if (*s1 == '\\' && s1[1] != '\0') 101543405724SLuigi Rizzo s1++; 101643405724SLuigi Rizzo 10175f356082SLuigi Rizzo buf = safe_calloc(s1 - s + 1, 1); 101843405724SLuigi Rizzo 101943405724SLuigi Rizzo /* 102043405724SLuigi Rizzo * copy into a buffer skipping backslashes 102143405724SLuigi Rizzo */ 102243405724SLuigi Rizzo for (p = s, i = 0; p != s1 ; p++) 102343405724SLuigi Rizzo if (*p != '\\') 102443405724SLuigi Rizzo buf[i++] = *p; 102543405724SLuigi Rizzo buf[i++] = '\0'; 10269758b77fSLuigi Rizzo 10279758b77fSLuigi Rizzo if (proto == IPPROTO_ETHERTYPE) { 102843405724SLuigi Rizzo i = match_token(ether_types, buf); 102943405724SLuigi Rizzo free(buf); 103043405724SLuigi Rizzo if (i != -1) { /* found */ 10319758b77fSLuigi Rizzo *end = s1; 10329758b77fSLuigi Rizzo return i; 10339758b77fSLuigi Rizzo } 10349758b77fSLuigi Rizzo } else { 10359758b77fSLuigi Rizzo struct protoent *pe = NULL; 10369758b77fSLuigi Rizzo struct servent *se; 10379758b77fSLuigi Rizzo 10389758b77fSLuigi Rizzo if (proto != 0) 10399758b77fSLuigi Rizzo pe = getprotobynumber(proto); 10409758b77fSLuigi Rizzo setservent(1); 104143405724SLuigi Rizzo se = getservbyname(buf, pe ? pe->p_name : NULL); 104243405724SLuigi Rizzo free(buf); 10439758b77fSLuigi Rizzo if (se != NULL) { 10449758b77fSLuigi Rizzo *end = s1; 10459758b77fSLuigi Rizzo return ntohs(se->s_port); 10469758b77fSLuigi Rizzo } 10479758b77fSLuigi Rizzo } 104843405724SLuigi Rizzo return 0; /* not found */ 10499758b77fSLuigi Rizzo } 10509758b77fSLuigi Rizzo 10519758b77fSLuigi Rizzo /* 1052571f8c1bSLuigi Rizzo * Fill the body of the command with the list of port ranges. 10539758b77fSLuigi Rizzo */ 10549758b77fSLuigi Rizzo static int 1055579ed7bdSAlexander V. Chernikov fill_newports(ipfw_insn_u16 *cmd, char *av, int proto, int cblen) 10569758b77fSLuigi Rizzo { 1057571f8c1bSLuigi Rizzo uint16_t a, b, *p = cmd->ports; 10589758b77fSLuigi Rizzo int i = 0; 1059e706181bSLuigi Rizzo char *s = av; 10609758b77fSLuigi Rizzo 1061e706181bSLuigi Rizzo while (*s) { 10629758b77fSLuigi Rizzo a = strtoport(av, &s, 0, proto); 1063254c4725SOleg Bulyzhin if (s == av) /* empty or invalid argument */ 1064254c4725SOleg Bulyzhin return (0); 1065254c4725SOleg Bulyzhin 1066579ed7bdSAlexander V. Chernikov CHECK_LENGTH(cblen, i + 2); 1067579ed7bdSAlexander V. Chernikov 1068254c4725SOleg Bulyzhin switch (*s) { 1069254c4725SOleg Bulyzhin case '-': /* a range */ 10709758b77fSLuigi Rizzo av = s + 1; 10719758b77fSLuigi Rizzo b = strtoport(av, &s, 0, proto); 1072254c4725SOleg Bulyzhin /* Reject expressions like '1-abc' or '1-2-3'. */ 1073254c4725SOleg Bulyzhin if (s == av || (*s != ',' && *s != '\0')) 1074254c4725SOleg Bulyzhin return (0); 10759758b77fSLuigi Rizzo p[0] = a; 10769758b77fSLuigi Rizzo p[1] = b; 1077254c4725SOleg Bulyzhin break; 1078254c4725SOleg Bulyzhin case ',': /* comma separated list */ 1079254c4725SOleg Bulyzhin case '\0': 10809758b77fSLuigi Rizzo p[0] = p[1] = a; 1081254c4725SOleg Bulyzhin break; 1082254c4725SOleg Bulyzhin default: 1083254c4725SOleg Bulyzhin warnx("port list: invalid separator <%c> in <%s>", 108499e5e645SLuigi Rizzo *s, av); 1085254c4725SOleg Bulyzhin return (0); 1086254c4725SOleg Bulyzhin } 1087254c4725SOleg Bulyzhin 1088e706181bSLuigi Rizzo i++; 1089e706181bSLuigi Rizzo p += 2; 10909758b77fSLuigi Rizzo av = s + 1; 10919758b77fSLuigi Rizzo } 10929758b77fSLuigi Rizzo if (i > 0) { 10939758b77fSLuigi Rizzo if (i + 1 > F_LEN_MASK) 1094e706181bSLuigi Rizzo errx(EX_DATAERR, "too many ports/ranges\n"); 10959758b77fSLuigi Rizzo cmd->o.len |= i + 1; /* leave F_NOT and F_OR untouched */ 10969758b77fSLuigi Rizzo } 1097254c4725SOleg Bulyzhin return (i); 10989758b77fSLuigi Rizzo } 10999758b77fSLuigi Rizzo 1100ae01d73cSAlexander V. Chernikov /* 1101ae01d73cSAlexander V. Chernikov * Fill the body of the command with the list of DiffServ codepoints. 1102ae01d73cSAlexander V. Chernikov */ 1103ae01d73cSAlexander V. Chernikov static void 1104ae01d73cSAlexander V. Chernikov fill_dscp(ipfw_insn *cmd, char *av, int cblen) 1105ae01d73cSAlexander V. Chernikov { 1106ae01d73cSAlexander V. Chernikov uint32_t *low, *high; 1107ae01d73cSAlexander V. Chernikov char *s = av, *a; 1108ae01d73cSAlexander V. Chernikov int code; 1109ae01d73cSAlexander V. Chernikov 1110ae01d73cSAlexander V. Chernikov cmd->opcode = O_DSCP; 1111ae01d73cSAlexander V. Chernikov cmd->len |= F_INSN_SIZE(ipfw_insn_u32) + 1; 1112ae01d73cSAlexander V. Chernikov 1113ae01d73cSAlexander V. Chernikov CHECK_CMDLEN; 1114ae01d73cSAlexander V. Chernikov 1115ae01d73cSAlexander V. Chernikov low = (uint32_t *)(cmd + 1); 1116ae01d73cSAlexander V. Chernikov high = low + 1; 1117ae01d73cSAlexander V. Chernikov 1118ae01d73cSAlexander V. Chernikov *low = 0; 1119ae01d73cSAlexander V. Chernikov *high = 0; 1120ae01d73cSAlexander V. Chernikov 1121ae01d73cSAlexander V. Chernikov while (s != NULL) { 1122ae01d73cSAlexander V. Chernikov a = strchr(s, ','); 1123ae01d73cSAlexander V. Chernikov 1124ae01d73cSAlexander V. Chernikov if (a != NULL) 1125ae01d73cSAlexander V. Chernikov *a++ = '\0'; 1126ae01d73cSAlexander V. Chernikov 1127ae01d73cSAlexander V. Chernikov if (isalpha(*s)) { 1128ae01d73cSAlexander V. Chernikov if ((code = match_token(f_ipdscp, s)) == -1) 1129ae01d73cSAlexander V. Chernikov errx(EX_DATAERR, "Unknown DSCP code"); 1130ae01d73cSAlexander V. Chernikov } else { 1131ae01d73cSAlexander V. Chernikov code = strtoul(s, NULL, 10); 1132ae01d73cSAlexander V. Chernikov if (code < 0 || code > 63) 1133ae01d73cSAlexander V. Chernikov errx(EX_DATAERR, "Invalid DSCP value"); 1134ae01d73cSAlexander V. Chernikov } 1135ae01d73cSAlexander V. Chernikov 113623a6c733SAndrey V. Elsukov if (code >= 32) 1137ae01d73cSAlexander V. Chernikov *high |= 1 << (code - 32); 1138ae01d73cSAlexander V. Chernikov else 1139ae01d73cSAlexander V. Chernikov *low |= 1 << code; 1140ae01d73cSAlexander V. Chernikov 1141ae01d73cSAlexander V. Chernikov s = a; 1142ae01d73cSAlexander V. Chernikov } 1143ae01d73cSAlexander V. Chernikov } 1144ae01d73cSAlexander V. Chernikov 1145fc727ad6SBoris Lytochkin /* 1146fc727ad6SBoris Lytochkin * Fill the body of the command with mark value and mask. 1147fc727ad6SBoris Lytochkin */ 1148fc727ad6SBoris Lytochkin static void 1149fc727ad6SBoris Lytochkin fill_mark(ipfw_insn *cmd, char *av, int cblen) 1150fc727ad6SBoris Lytochkin { 1151fc727ad6SBoris Lytochkin uint32_t *value, *mask; 1152fc727ad6SBoris Lytochkin char *value_str; 1153fc727ad6SBoris Lytochkin 1154fc727ad6SBoris Lytochkin cmd->opcode = O_MARK; 1155fc727ad6SBoris Lytochkin cmd->len |= F_INSN_SIZE(ipfw_insn_u32) + 1; 1156fc727ad6SBoris Lytochkin 1157fc727ad6SBoris Lytochkin CHECK_CMDLEN; 1158fc727ad6SBoris Lytochkin 1159fc727ad6SBoris Lytochkin value = (uint32_t *)(cmd + 1); 1160fc727ad6SBoris Lytochkin mask = value + 1; 1161fc727ad6SBoris Lytochkin 1162fc727ad6SBoris Lytochkin value_str = strsep(&av, ":"); 1163fc727ad6SBoris Lytochkin 1164fc727ad6SBoris Lytochkin if (strcmp(value_str, "tablearg") == 0) { 1165fc727ad6SBoris Lytochkin cmd->arg1 = IP_FW_TARG; 1166fc727ad6SBoris Lytochkin *value = 0; 1167fc727ad6SBoris Lytochkin } else { 1168fc727ad6SBoris Lytochkin /* This is not a tablearg */ 1169fc727ad6SBoris Lytochkin cmd->arg1 |= 0x8000; 1170fc727ad6SBoris Lytochkin *value = strtoul(value_str, NULL, 0); 1171fc727ad6SBoris Lytochkin } 1172fc727ad6SBoris Lytochkin if (av) 1173fc727ad6SBoris Lytochkin *mask = strtoul(av, NULL, 0); 1174fc727ad6SBoris Lytochkin else 1175fc727ad6SBoris Lytochkin *mask = 0xFFFFFFFF; 1176fc727ad6SBoris Lytochkin 1177fc727ad6SBoris Lytochkin if ((*value & *mask) != *value) 1178fc727ad6SBoris Lytochkin errx(EX_DATAERR, "Static mark value: some bits in value are" 1179fc727ad6SBoris Lytochkin " set that will be masked out by mask " 1180fc727ad6SBoris Lytochkin "(%#x & %#x) = %#x != %#x", 1181fc727ad6SBoris Lytochkin *value, *mask, (*value & *mask), *value); 1182fc727ad6SBoris Lytochkin } 1183fc727ad6SBoris Lytochkin 11849758b77fSLuigi Rizzo static struct _s_x icmpcodes[] = { 11859758b77fSLuigi Rizzo { "net", ICMP_UNREACH_NET }, 11869758b77fSLuigi Rizzo { "host", ICMP_UNREACH_HOST }, 11879758b77fSLuigi Rizzo { "protocol", ICMP_UNREACH_PROTOCOL }, 11889758b77fSLuigi Rizzo { "port", ICMP_UNREACH_PORT }, 11899758b77fSLuigi Rizzo { "needfrag", ICMP_UNREACH_NEEDFRAG }, 11909758b77fSLuigi Rizzo { "srcfail", ICMP_UNREACH_SRCFAIL }, 11919758b77fSLuigi Rizzo { "net-unknown", ICMP_UNREACH_NET_UNKNOWN }, 11929758b77fSLuigi Rizzo { "host-unknown", ICMP_UNREACH_HOST_UNKNOWN }, 11939758b77fSLuigi Rizzo { "isolated", ICMP_UNREACH_ISOLATED }, 11949758b77fSLuigi Rizzo { "net-prohib", ICMP_UNREACH_NET_PROHIB }, 11959758b77fSLuigi Rizzo { "host-prohib", ICMP_UNREACH_HOST_PROHIB }, 11969758b77fSLuigi Rizzo { "tosnet", ICMP_UNREACH_TOSNET }, 11979758b77fSLuigi Rizzo { "toshost", ICMP_UNREACH_TOSHOST }, 11989758b77fSLuigi Rizzo { "filter-prohib", ICMP_UNREACH_FILTER_PROHIB }, 11999758b77fSLuigi Rizzo { "host-precedence", ICMP_UNREACH_HOST_PRECEDENCE }, 12009758b77fSLuigi Rizzo { "precedence-cutoff", ICMP_UNREACH_PRECEDENCE_CUTOFF }, 12019758b77fSLuigi Rizzo { NULL, 0 } 12029758b77fSLuigi Rizzo }; 12039758b77fSLuigi Rizzo 12042b5dd8b8SAlexander V. Chernikov static uint16_t 12052b5dd8b8SAlexander V. Chernikov get_reject_code(const char *str) 12069758b77fSLuigi Rizzo { 12079758b77fSLuigi Rizzo int val; 12089758b77fSLuigi Rizzo char *s; 12099758b77fSLuigi Rizzo 12109758b77fSLuigi Rizzo val = strtoul(str, &s, 0); 12119758b77fSLuigi Rizzo if (s == str || *s != '\0' || val >= 0x100) 12129758b77fSLuigi Rizzo val = match_token(icmpcodes, str); 1213e706181bSLuigi Rizzo if (val < 0) 12149758b77fSLuigi Rizzo errx(EX_DATAERR, "unknown ICMP unreachable code ``%s''", str); 12152b5dd8b8SAlexander V. Chernikov return (val); 12169758b77fSLuigi Rizzo } 12179758b77fSLuigi Rizzo 12189758b77fSLuigi Rizzo static void 1219563b5ab1SAlexander V. Chernikov print_reject_code(struct buf_pr *bp, uint16_t code) 12209758b77fSLuigi Rizzo { 1221563b5ab1SAlexander V. Chernikov char const *s; 12229758b77fSLuigi Rizzo 1223563b5ab1SAlexander V. Chernikov if ((s = match_value(icmpcodes, code)) != NULL) 1224563b5ab1SAlexander V. Chernikov bprintf(bp, "unreach %s", s); 12259758b77fSLuigi Rizzo else 1226563b5ab1SAlexander V. Chernikov bprintf(bp, "unreach %u", code); 12279758b77fSLuigi Rizzo } 12289758b77fSLuigi Rizzo 12299758b77fSLuigi Rizzo /* 12309758b77fSLuigi Rizzo * Returns the number of bits set (from left) in a contiguous bitmask, 12319758b77fSLuigi Rizzo * or -1 if the mask is not contiguous. 12329758b77fSLuigi Rizzo * XXX this needs a proper fix. 12339758b77fSLuigi Rizzo * This effectively works on masks in big-endian (network) format. 12349758b77fSLuigi Rizzo * when compiled on little endian architectures. 12359758b77fSLuigi Rizzo * 12369758b77fSLuigi Rizzo * First bit is bit 7 of the first byte -- note, for MAC addresses, 12379758b77fSLuigi Rizzo * the first bit on the wire is bit 0 of the first byte. 12389758b77fSLuigi Rizzo * len is the max length in bits. 12399758b77fSLuigi Rizzo */ 1240ead75a59SLuigi Rizzo int 124156707beeSMark Johnston contigmask(const uint8_t *p, int len) 12429758b77fSLuigi Rizzo { 12439758b77fSLuigi Rizzo int i, n; 1244f3a126d3SLuigi Rizzo 12459758b77fSLuigi Rizzo for (i=0; i<len ; i++) 12469758b77fSLuigi Rizzo if ( (p[i/8] & (1 << (7 - (i%8)))) == 0) /* first bit unset */ 12479758b77fSLuigi Rizzo break; 12489758b77fSLuigi Rizzo for (n=i+1; n < len; n++) 12499758b77fSLuigi Rizzo if ( (p[n/8] & (1 << (7 - (n%8)))) != 0) 12509758b77fSLuigi Rizzo return -1; /* mask not contiguous */ 12519758b77fSLuigi Rizzo return i; 12529758b77fSLuigi Rizzo } 12539758b77fSLuigi Rizzo 12549758b77fSLuigi Rizzo /* 12559758b77fSLuigi Rizzo * print flags set/clear in the two bitmasks passed as parameters. 12569758b77fSLuigi Rizzo * There is a specialized check for f_tcpflags. 12579758b77fSLuigi Rizzo */ 12589758b77fSLuigi Rizzo static void 125956707beeSMark Johnston print_flags(struct buf_pr *bp, char const *name, const ipfw_insn *cmd, 12604df4dadaSAlexander V. Chernikov struct _s_x *list) 12619758b77fSLuigi Rizzo { 126262ff38aeSLuigi Rizzo char const *comma = ""; 12639758b77fSLuigi Rizzo int i; 1264f3a126d3SLuigi Rizzo uint8_t set = cmd->arg1 & 0xff; 1265f3a126d3SLuigi Rizzo uint8_t clear = (cmd->arg1 >> 8) & 0xff; 12669758b77fSLuigi Rizzo 12679758b77fSLuigi Rizzo if (list == f_tcpflags && set == TH_SYN && clear == TH_ACK) { 12684df4dadaSAlexander V. Chernikov bprintf(bp, " setup"); 12699758b77fSLuigi Rizzo return; 12709758b77fSLuigi Rizzo } 12719758b77fSLuigi Rizzo 12724df4dadaSAlexander V. Chernikov bprintf(bp, " %s ", name); 12739758b77fSLuigi Rizzo for (i=0; list[i].x != 0; i++) { 12749758b77fSLuigi Rizzo if (set & list[i].x) { 12759758b77fSLuigi Rizzo set &= ~list[i].x; 12764df4dadaSAlexander V. Chernikov bprintf(bp, "%s%s", comma, list[i].s); 12779758b77fSLuigi Rizzo comma = ","; 12789758b77fSLuigi Rizzo } 12799758b77fSLuigi Rizzo if (clear & list[i].x) { 12809758b77fSLuigi Rizzo clear &= ~list[i].x; 12814df4dadaSAlexander V. Chernikov bprintf(bp, "%s!%s", comma, list[i].s); 12829758b77fSLuigi Rizzo comma = ","; 12839758b77fSLuigi Rizzo } 12849758b77fSLuigi Rizzo } 12859758b77fSLuigi Rizzo } 12869758b77fSLuigi Rizzo 1287914bffb6SAlexander V. Chernikov 12889758b77fSLuigi Rizzo /* 12899758b77fSLuigi Rizzo * Print the ip address contained in a command. 12909758b77fSLuigi Rizzo */ 12919758b77fSLuigi Rizzo static void 129256707beeSMark Johnston print_ip(struct buf_pr *bp, const struct format_opts *fo, 129356707beeSMark Johnston const ipfw_insn_ip *cmd) 12949758b77fSLuigi Rizzo { 12959758b77fSLuigi Rizzo struct hostent *he = NULL; 129656707beeSMark Johnston const struct in_addr *ia; 129756707beeSMark Johnston const uint32_t *a = ((const ipfw_insn_u32 *)cmd)->d; 129856707beeSMark Johnston uint32_t len = F_LEN((const ipfw_insn *)cmd); 1299b23d5de9SAlexander V. Chernikov char *t; 13009758b77fSLuigi Rizzo 1301bd32e335SAndrey V. Elsukov bprintf(bp, " "); 1302472099c4SLuigi Rizzo if (cmd->o.opcode == O_IP_DST_LOOKUP && len > F_INSN_SIZE(ipfw_insn_u32)) { 130381cac390SArseny Smalyuk const char *arg; 1304472099c4SLuigi Rizzo 130581cac390SArseny Smalyuk arg = match_value(lookup_keys, a[1]); 130656707beeSMark Johnston t = table_search_ctlv(fo->tstate, 130756707beeSMark Johnston ((const ipfw_insn *)cmd)->arg1); 130809a6be91SAndrey V. Elsukov bprintf(bp, "lookup %s %s", arg, t); 1309472099c4SLuigi Rizzo return; 1310472099c4SLuigi Rizzo } 13119758b77fSLuigi Rizzo if (cmd->o.opcode == O_IP_SRC_ME || cmd->o.opcode == O_IP_DST_ME) { 13124df4dadaSAlexander V. Chernikov bprintf(bp, "me"); 13139758b77fSLuigi Rizzo return; 13149758b77fSLuigi Rizzo } 1315cd8b5ae0SRuslan Ermilov if (cmd->o.opcode == O_IP_SRC_LOOKUP || 1316cd8b5ae0SRuslan Ermilov cmd->o.opcode == O_IP_DST_LOOKUP) { 131756707beeSMark Johnston t = table_search_ctlv(fo->tstate, 131856707beeSMark Johnston ((const ipfw_insn *)cmd)->arg1); 13194df4dadaSAlexander V. Chernikov bprintf(bp, "table(%s", t); 1320cd8b5ae0SRuslan Ermilov if (len == F_INSN_SIZE(ipfw_insn_u32)) 13214df4dadaSAlexander V. Chernikov bprintf(bp, ",%u", *a); 13224df4dadaSAlexander V. Chernikov bprintf(bp, ")"); 1323cd8b5ae0SRuslan Ermilov return; 1324cd8b5ae0SRuslan Ermilov } 13259758b77fSLuigi Rizzo if (cmd->o.opcode == O_IP_SRC_SET || cmd->o.opcode == O_IP_DST_SET) { 132656707beeSMark Johnston const uint32_t *map = (const uint32_t *)&cmd->mask; 132756707beeSMark Johnston struct in_addr addr; 132856707beeSMark Johnston uint32_t x; 13299ef3f16dSLuigi Rizzo int i, j; 13309758b77fSLuigi Rizzo char comma = '{'; 13319758b77fSLuigi Rizzo 13329758b77fSLuigi Rizzo x = cmd->o.arg1 - 1; 13339758b77fSLuigi Rizzo x = htonl(~x); 133456707beeSMark Johnston addr.s_addr = htonl(cmd->addr.s_addr); 133556707beeSMark Johnston bprintf(bp, "%s/%d", inet_ntoa(addr), 1336f3a126d3SLuigi Rizzo contigmask((uint8_t *)&x, 32)); 133756707beeSMark Johnston x = cmd->addr.s_addr; 13389758b77fSLuigi Rizzo x &= 0xff; /* base */ 13399ef3f16dSLuigi Rizzo /* 13409ef3f16dSLuigi Rizzo * Print bits and ranges. 13419ef3f16dSLuigi Rizzo * Locate first bit set (i), then locate first bit unset (j). 13429ef3f16dSLuigi Rizzo * If we have 3+ consecutive bits set, then print them as a 13439ef3f16dSLuigi Rizzo * range, otherwise only print the initial bit and rescan. 13449ef3f16dSLuigi Rizzo */ 13459758b77fSLuigi Rizzo for (i=0; i < cmd->o.arg1; i++) 1346571f8c1bSLuigi Rizzo if (map[i/32] & (1<<(i & 31))) { 13479ef3f16dSLuigi Rizzo for (j=i+1; j < cmd->o.arg1; j++) 1348571f8c1bSLuigi Rizzo if (!(map[ j/32] & (1<<(j & 31)))) 13499ef3f16dSLuigi Rizzo break; 13504df4dadaSAlexander V. Chernikov bprintf(bp, "%c%d", comma, i+x); 13519ef3f16dSLuigi Rizzo if (j>i+2) { /* range has at least 3 elements */ 13524df4dadaSAlexander V. Chernikov bprintf(bp, "-%d", j-1+x); 13539ef3f16dSLuigi Rizzo i = j-1; 13549ef3f16dSLuigi Rizzo } 13559758b77fSLuigi Rizzo comma = ','; 13569758b77fSLuigi Rizzo } 13574df4dadaSAlexander V. Chernikov bprintf(bp, "}"); 13589758b77fSLuigi Rizzo return; 13599758b77fSLuigi Rizzo } 1360571f8c1bSLuigi Rizzo /* 1361571f8c1bSLuigi Rizzo * len == 2 indicates a single IP, whereas lists of 1 or more 1362571f8c1bSLuigi Rizzo * addr/mask pairs have len = (2n+1). We convert len to n so we 1363571f8c1bSLuigi Rizzo * use that to count the number of entries. 1364571f8c1bSLuigi Rizzo */ 1365571f8c1bSLuigi Rizzo for (len = len / 2; len > 0; len--, a += 2) { 1366571f8c1bSLuigi Rizzo int mb = /* mask length */ 1367571f8c1bSLuigi Rizzo (cmd->o.opcode == O_IP_SRC || cmd->o.opcode == O_IP_DST) ? 136856707beeSMark Johnston 32 : contigmask((const uint8_t *)&(a[1]), 32); 136956707beeSMark Johnston if (mb == 32 && g_co.do_resolv) 137056707beeSMark Johnston he = gethostbyaddr((const char *)&(a[0]), sizeof(in_addr_t), 13715f9c94c5SAndrey V. Elsukov AF_INET); 13729758b77fSLuigi Rizzo if (he != NULL) /* resolved to name */ 13734df4dadaSAlexander V. Chernikov bprintf(bp, "%s", he->h_name); 13749758b77fSLuigi Rizzo else if (mb == 0) /* any */ 13754df4dadaSAlexander V. Chernikov bprintf(bp, "any"); 13769758b77fSLuigi Rizzo else { /* numeric IP followed by some kind of mask */ 137756707beeSMark Johnston ia = (const struct in_addr *)&a[0]; 13784df4dadaSAlexander V. Chernikov bprintf(bp, "%s", inet_ntoa(*ia)); 1379382a5cbfSAlexander V. Chernikov if (mb < 0) { 138056707beeSMark Johnston ia = (const struct in_addr *)&a[1]; 13814df4dadaSAlexander V. Chernikov bprintf(bp, ":%s", inet_ntoa(*ia)); 1382382a5cbfSAlexander V. Chernikov } else if (mb < 32) 13834df4dadaSAlexander V. Chernikov bprintf(bp, "/%d", mb); 13849758b77fSLuigi Rizzo } 1385571f8c1bSLuigi Rizzo if (len > 1) 13864df4dadaSAlexander V. Chernikov bprintf(bp, ","); 1387571f8c1bSLuigi Rizzo } 13889758b77fSLuigi Rizzo } 13899758b77fSLuigi Rizzo 13909758b77fSLuigi Rizzo /* 13919758b77fSLuigi Rizzo * prints a MAC address/mask pair 13929758b77fSLuigi Rizzo */ 13939758b77fSLuigi Rizzo static void 139456707beeSMark Johnston format_mac(struct buf_pr *bp, const uint8_t *addr, const uint8_t *mask) 13959758b77fSLuigi Rizzo { 13969758b77fSLuigi Rizzo int l = contigmask(mask, 48); 13979758b77fSLuigi Rizzo 13989758b77fSLuigi Rizzo if (l == 0) 13994df4dadaSAlexander V. Chernikov bprintf(bp, " any"); 14009758b77fSLuigi Rizzo else { 14014df4dadaSAlexander V. Chernikov bprintf(bp, " %02x:%02x:%02x:%02x:%02x:%02x", 14029758b77fSLuigi Rizzo addr[0], addr[1], addr[2], addr[3], addr[4], addr[5]); 14039758b77fSLuigi Rizzo if (l == -1) 14044df4dadaSAlexander V. Chernikov bprintf(bp, "&%02x:%02x:%02x:%02x:%02x:%02x", 14059758b77fSLuigi Rizzo mask[0], mask[1], mask[2], 14069758b77fSLuigi Rizzo mask[3], mask[4], mask[5]); 14079758b77fSLuigi Rizzo else if (l < 48) 14084df4dadaSAlexander V. Chernikov bprintf(bp, "/%d", l); 14099758b77fSLuigi Rizzo } 14109758b77fSLuigi Rizzo } 14119758b77fSLuigi Rizzo 14125e43aef8SLuigi Rizzo static void 141356707beeSMark Johnston print_mac(struct buf_pr *bp, const ipfw_insn_mac *mac) 1414aed02679SAndrey V. Elsukov { 1415aed02679SAndrey V. Elsukov 1416aed02679SAndrey V. Elsukov bprintf(bp, " MAC"); 1417aed02679SAndrey V. Elsukov format_mac(bp, mac->addr, mac->mask); 1418aed02679SAndrey V. Elsukov format_mac(bp, mac->addr + 6, mac->mask + 6); 1419aed02679SAndrey V. Elsukov } 1420aed02679SAndrey V. Elsukov 1421aed02679SAndrey V. Elsukov static void 142281cac390SArseny Smalyuk print_mac_lookup(struct buf_pr *bp, const struct format_opts *fo, 142381cac390SArseny Smalyuk const ipfw_insn *cmd) 142481cac390SArseny Smalyuk { 142581cac390SArseny Smalyuk uint32_t len = F_LEN(cmd); 142681cac390SArseny Smalyuk char *t; 142781cac390SArseny Smalyuk 142881cac390SArseny Smalyuk bprintf(bp, " "); 142981cac390SArseny Smalyuk 143081cac390SArseny Smalyuk t = table_search_ctlv(fo->tstate, cmd->arg1); 143181cac390SArseny Smalyuk bprintf(bp, "table(%s", t); 143281cac390SArseny Smalyuk if (len == F_INSN_SIZE(ipfw_insn_u32)) 143381cac390SArseny Smalyuk bprintf(bp, ",%u", ((const ipfw_insn_u32 *)cmd)->d[0]); 143481cac390SArseny Smalyuk bprintf(bp, ")"); 143581cac390SArseny Smalyuk } 143681cac390SArseny Smalyuk 143781cac390SArseny Smalyuk static void 14385e43aef8SLuigi Rizzo fill_icmptypes(ipfw_insn_u32 *cmd, char *av) 14395e43aef8SLuigi Rizzo { 1440571f8c1bSLuigi Rizzo uint8_t type; 14415e43aef8SLuigi Rizzo 14425e43aef8SLuigi Rizzo cmd->d[0] = 0; 14435e43aef8SLuigi Rizzo while (*av) { 14445e43aef8SLuigi Rizzo if (*av == ',') 14455e43aef8SLuigi Rizzo av++; 14465e43aef8SLuigi Rizzo 14475e43aef8SLuigi Rizzo type = strtoul(av, &av, 0); 14485e43aef8SLuigi Rizzo 14495e43aef8SLuigi Rizzo if (*av != ',' && *av != '\0') 14505e43aef8SLuigi Rizzo errx(EX_DATAERR, "invalid ICMP type"); 14515e43aef8SLuigi Rizzo 14525e43aef8SLuigi Rizzo if (type > 31) 14535e43aef8SLuigi Rizzo errx(EX_DATAERR, "ICMP type out of range"); 14545e43aef8SLuigi Rizzo 14555e43aef8SLuigi Rizzo cmd->d[0] |= 1 << type; 14565e43aef8SLuigi Rizzo } 14575e43aef8SLuigi Rizzo cmd->o.opcode = O_ICMPTYPE; 14585e43aef8SLuigi Rizzo cmd->o.len |= F_INSN_SIZE(ipfw_insn_u32); 14595e43aef8SLuigi Rizzo } 14605e43aef8SLuigi Rizzo 14615e43aef8SLuigi Rizzo static void 146256707beeSMark Johnston print_icmptypes(struct buf_pr *bp, const ipfw_insn_u32 *cmd) 14635e43aef8SLuigi Rizzo { 14645e43aef8SLuigi Rizzo int i; 14655e43aef8SLuigi Rizzo char sep= ' '; 14665e43aef8SLuigi Rizzo 14674df4dadaSAlexander V. Chernikov bprintf(bp, " icmptypes"); 14685e43aef8SLuigi Rizzo for (i = 0; i < 32; i++) { 14695e43aef8SLuigi Rizzo if ( (cmd->d[0] & (1 << (i))) == 0) 14705e43aef8SLuigi Rizzo continue; 14714df4dadaSAlexander V. Chernikov bprintf(bp, "%c%d", sep, i); 14725e43aef8SLuigi Rizzo sep = ','; 14735e43aef8SLuigi Rizzo } 14745e43aef8SLuigi Rizzo } 14759758b77fSLuigi Rizzo 1476ae01d73cSAlexander V. Chernikov static void 147756707beeSMark Johnston print_dscp(struct buf_pr *bp, const ipfw_insn_u32 *cmd) 1478ae01d73cSAlexander V. Chernikov { 147956707beeSMark Johnston const uint32_t *v; 1480ae01d73cSAlexander V. Chernikov const char *code; 148156707beeSMark Johnston int i = 0; 148256707beeSMark Johnston char sep= ' '; 1483ae01d73cSAlexander V. Chernikov 14844df4dadaSAlexander V. Chernikov bprintf(bp, " dscp"); 1485ae01d73cSAlexander V. Chernikov v = cmd->d; 1486ae01d73cSAlexander V. Chernikov while (i < 64) { 1487ae01d73cSAlexander V. Chernikov if (*v & (1 << i)) { 1488ae01d73cSAlexander V. Chernikov if ((code = match_value(f_ipdscp, i)) != NULL) 14894df4dadaSAlexander V. Chernikov bprintf(bp, "%c%s", sep, code); 1490ae01d73cSAlexander V. Chernikov else 14914df4dadaSAlexander V. Chernikov bprintf(bp, "%c%d", sep, i); 1492ae01d73cSAlexander V. Chernikov sep = ','; 1493ae01d73cSAlexander V. Chernikov } 1494ae01d73cSAlexander V. Chernikov 1495ae01d73cSAlexander V. Chernikov if ((++i % 32) == 0) 1496ae01d73cSAlexander V. Chernikov v++; 1497ae01d73cSAlexander V. Chernikov } 1498ae01d73cSAlexander V. Chernikov } 1499ae01d73cSAlexander V. Chernikov 150056707beeSMark Johnston #define insntod(cmd, type) ((const ipfw_insn_ ## type *)(cmd)) 1501aed02679SAndrey V. Elsukov struct show_state { 1502aed02679SAndrey V. Elsukov struct ip_fw_rule *rule; 1503aed02679SAndrey V. Elsukov const ipfw_insn *eaction; 1504aed02679SAndrey V. Elsukov uint8_t *printed; 1505aed02679SAndrey V. Elsukov int flags; 150699e5e645SLuigi Rizzo #define HAVE_PROTO 0x0001 150799e5e645SLuigi Rizzo #define HAVE_SRCIP 0x0002 150899e5e645SLuigi Rizzo #define HAVE_DSTIP 0x0004 1509f7c4fdeeSAndrey V. Elsukov #define HAVE_PROBE_STATE 0x0008 1510aed02679SAndrey V. Elsukov int proto; 1511aed02679SAndrey V. Elsukov int or_block; 1512aed02679SAndrey V. Elsukov }; 1513aed02679SAndrey V. Elsukov 1514aed02679SAndrey V. Elsukov static int 1515aed02679SAndrey V. Elsukov init_show_state(struct show_state *state, struct ip_fw_rule *rule) 1516aed02679SAndrey V. Elsukov { 1517aed02679SAndrey V. Elsukov 1518aed02679SAndrey V. Elsukov state->printed = calloc(rule->cmd_len, sizeof(uint8_t)); 1519aed02679SAndrey V. Elsukov if (state->printed == NULL) 1520aed02679SAndrey V. Elsukov return (ENOMEM); 1521aed02679SAndrey V. Elsukov state->rule = rule; 1522aed02679SAndrey V. Elsukov state->eaction = NULL; 1523aed02679SAndrey V. Elsukov state->flags = 0; 1524aed02679SAndrey V. Elsukov state->proto = 0; 1525aed02679SAndrey V. Elsukov state->or_block = 0; 1526aed02679SAndrey V. Elsukov return (0); 1527aed02679SAndrey V. Elsukov } 15289758b77fSLuigi Rizzo 15299758b77fSLuigi Rizzo static void 1530aed02679SAndrey V. Elsukov free_show_state(struct show_state *state) 15319758b77fSLuigi Rizzo { 153299e5e645SLuigi Rizzo 1533aed02679SAndrey V. Elsukov free(state->printed); 1534aed02679SAndrey V. Elsukov } 1535aed02679SAndrey V. Elsukov 1536aed02679SAndrey V. Elsukov static uint8_t 1537aed02679SAndrey V. Elsukov is_printed_opcode(struct show_state *state, const ipfw_insn *cmd) 1538aed02679SAndrey V. Elsukov { 1539aed02679SAndrey V. Elsukov 1540aed02679SAndrey V. Elsukov return (state->printed[cmd - state->rule->cmd]); 1541aed02679SAndrey V. Elsukov } 1542aed02679SAndrey V. Elsukov 1543aed02679SAndrey V. Elsukov static void 1544aed02679SAndrey V. Elsukov mark_printed(struct show_state *state, const ipfw_insn *cmd) 1545aed02679SAndrey V. Elsukov { 1546aed02679SAndrey V. Elsukov 1547aed02679SAndrey V. Elsukov state->printed[cmd - state->rule->cmd] = 1; 1548aed02679SAndrey V. Elsukov } 1549aed02679SAndrey V. Elsukov 1550aed02679SAndrey V. Elsukov static void 1551f7c4fdeeSAndrey V. Elsukov print_limit_mask(struct buf_pr *bp, const ipfw_insn_limit *limit) 1552aed02679SAndrey V. Elsukov { 1553aed02679SAndrey V. Elsukov struct _s_x *p = limit_masks; 1554aed02679SAndrey V. Elsukov char const *comma = " "; 1555aed02679SAndrey V. Elsukov uint8_t x; 1556aed02679SAndrey V. Elsukov 1557aed02679SAndrey V. Elsukov for (x = limit->limit_mask; p->x != 0; p++) { 1558aed02679SAndrey V. Elsukov if ((x & p->x) == p->x) { 1559aed02679SAndrey V. Elsukov x &= ~p->x; 1560aed02679SAndrey V. Elsukov bprintf(bp, "%s%s", comma, p->s); 1561aed02679SAndrey V. Elsukov comma = ","; 1562aed02679SAndrey V. Elsukov } 1563aed02679SAndrey V. Elsukov } 1564aed02679SAndrey V. Elsukov bprint_uint_arg(bp, " ", limit->conn_limit); 1565aed02679SAndrey V. Elsukov } 1566aed02679SAndrey V. Elsukov 1567aed02679SAndrey V. Elsukov static int 1568aed02679SAndrey V. Elsukov print_instruction(struct buf_pr *bp, const struct format_opts *fo, 156956707beeSMark Johnston struct show_state *state, const ipfw_insn *cmd) 1570aed02679SAndrey V. Elsukov { 1571aed02679SAndrey V. Elsukov struct protoent *pe; 1572aed02679SAndrey V. Elsukov struct passwd *pwd; 1573aed02679SAndrey V. Elsukov struct group *grp; 1574aed02679SAndrey V. Elsukov const char *s; 1575aed02679SAndrey V. Elsukov double d; 1576aed02679SAndrey V. Elsukov 1577aed02679SAndrey V. Elsukov if (is_printed_opcode(state, cmd)) 1578aed02679SAndrey V. Elsukov return (0); 1579aed02679SAndrey V. Elsukov if ((cmd->len & F_OR) != 0 && state->or_block == 0) 1580aed02679SAndrey V. Elsukov bprintf(bp, " {"); 1581aed02679SAndrey V. Elsukov if (cmd->opcode != O_IN && (cmd->len & F_NOT) != 0) 1582aed02679SAndrey V. Elsukov bprintf(bp, " not"); 1583aed02679SAndrey V. Elsukov 1584aed02679SAndrey V. Elsukov switch (cmd->opcode) { 1585aed02679SAndrey V. Elsukov case O_PROB: 1586aed02679SAndrey V. Elsukov d = 1.0 * insntod(cmd, u32)->d[0] / 0x7fffffff; 1587aed02679SAndrey V. Elsukov bprintf(bp, "prob %f ", d); 1588aed02679SAndrey V. Elsukov break; 1589aed02679SAndrey V. Elsukov case O_PROBE_STATE: /* no need to print anything here */ 1590f7c4fdeeSAndrey V. Elsukov state->flags |= HAVE_PROBE_STATE; 1591aed02679SAndrey V. Elsukov break; 1592aed02679SAndrey V. Elsukov case O_IP_SRC: 1593aed02679SAndrey V. Elsukov case O_IP_SRC_LOOKUP: 1594aed02679SAndrey V. Elsukov case O_IP_SRC_MASK: 1595aed02679SAndrey V. Elsukov case O_IP_SRC_ME: 1596aed02679SAndrey V. Elsukov case O_IP_SRC_SET: 1597c5bf4b1bSAndrey V. Elsukov if (state->flags & HAVE_SRCIP) 1598c5bf4b1bSAndrey V. Elsukov bprintf(bp, " src-ip"); 1599c5bf4b1bSAndrey V. Elsukov print_ip(bp, fo, insntod(cmd, ip)); 1600c5bf4b1bSAndrey V. Elsukov break; 1601aed02679SAndrey V. Elsukov case O_IP_DST: 1602aed02679SAndrey V. Elsukov case O_IP_DST_LOOKUP: 1603aed02679SAndrey V. Elsukov case O_IP_DST_MASK: 1604aed02679SAndrey V. Elsukov case O_IP_DST_ME: 1605aed02679SAndrey V. Elsukov case O_IP_DST_SET: 1606c5bf4b1bSAndrey V. Elsukov if (state->flags & HAVE_DSTIP) 1607c5bf4b1bSAndrey V. Elsukov bprintf(bp, " dst-ip"); 1608bd32e335SAndrey V. Elsukov print_ip(bp, fo, insntod(cmd, ip)); 1609aed02679SAndrey V. Elsukov break; 1610aed02679SAndrey V. Elsukov case O_IP6_SRC: 1611aed02679SAndrey V. Elsukov case O_IP6_SRC_MASK: 1612aed02679SAndrey V. Elsukov case O_IP6_SRC_ME: 1613c5bf4b1bSAndrey V. Elsukov if (state->flags & HAVE_SRCIP) 1614c5bf4b1bSAndrey V. Elsukov bprintf(bp, " src-ip6"); 1615c5bf4b1bSAndrey V. Elsukov print_ip6(bp, insntod(cmd, ip6)); 1616c5bf4b1bSAndrey V. Elsukov break; 1617aed02679SAndrey V. Elsukov case O_IP6_DST: 1618aed02679SAndrey V. Elsukov case O_IP6_DST_MASK: 1619aed02679SAndrey V. Elsukov case O_IP6_DST_ME: 1620c5bf4b1bSAndrey V. Elsukov if (state->flags & HAVE_DSTIP) 1621c5bf4b1bSAndrey V. Elsukov bprintf(bp, " dst-ip6"); 1622bd32e335SAndrey V. Elsukov print_ip6(bp, insntod(cmd, ip6)); 1623aed02679SAndrey V. Elsukov break; 162481cac390SArseny Smalyuk case O_MAC_SRC_LOOKUP: 162581cac390SArseny Smalyuk bprintf(bp, " src-mac"); 162681cac390SArseny Smalyuk print_mac_lookup(bp, fo, cmd); 162781cac390SArseny Smalyuk break; 162881cac390SArseny Smalyuk case O_MAC_DST_LOOKUP: 162981cac390SArseny Smalyuk bprintf(bp, " dst-mac"); 163081cac390SArseny Smalyuk print_mac_lookup(bp, fo, cmd); 163181cac390SArseny Smalyuk break; 1632aed02679SAndrey V. Elsukov case O_FLOW6ID: 1633aed02679SAndrey V. Elsukov print_flow6id(bp, insntod(cmd, u32)); 1634aed02679SAndrey V. Elsukov break; 1635aed02679SAndrey V. Elsukov case O_IP_DSTPORT: 1636aed02679SAndrey V. Elsukov case O_IP_SRCPORT: 1637aed02679SAndrey V. Elsukov print_newports(bp, insntod(cmd, u16), state->proto, 1638aed02679SAndrey V. Elsukov (state->flags & (HAVE_SRCIP | HAVE_DSTIP)) == 1639aed02679SAndrey V. Elsukov (HAVE_SRCIP | HAVE_DSTIP) ? cmd->opcode: 0); 1640aed02679SAndrey V. Elsukov break; 1641aed02679SAndrey V. Elsukov case O_PROTO: 1642aed02679SAndrey V. Elsukov pe = getprotobynumber(cmd->arg1); 1643aed02679SAndrey V. Elsukov if (state->flags & HAVE_PROTO) 1644aed02679SAndrey V. Elsukov bprintf(bp, " proto"); 1645aed02679SAndrey V. Elsukov if (pe != NULL) 1646aed02679SAndrey V. Elsukov bprintf(bp, " %s", pe->p_name); 164757cd6d26SMax Laier else 1648aed02679SAndrey V. Elsukov bprintf(bp, " %u", cmd->arg1); 1649a895c1c2SAndrey V. Elsukov state->proto = cmd->arg1; 1650aed02679SAndrey V. Elsukov break; 1651aed02679SAndrey V. Elsukov case O_MACADDR2: 1652aed02679SAndrey V. Elsukov print_mac(bp, insntod(cmd, mac)); 1653aed02679SAndrey V. Elsukov break; 1654aed02679SAndrey V. Elsukov case O_MAC_TYPE: 1655aed02679SAndrey V. Elsukov print_newports(bp, insntod(cmd, u16), 1656aed02679SAndrey V. Elsukov IPPROTO_ETHERTYPE, cmd->opcode); 1657aed02679SAndrey V. Elsukov break; 1658aed02679SAndrey V. Elsukov case O_FRAG: 1659825398f9SGleb Smirnoff print_flags(bp, "frag", cmd, f_ipoff); 1660aed02679SAndrey V. Elsukov break; 1661aed02679SAndrey V. Elsukov case O_FIB: 1662aed02679SAndrey V. Elsukov bprintf(bp, " fib %u", cmd->arg1); 1663aed02679SAndrey V. Elsukov break; 1664aed02679SAndrey V. Elsukov case O_SOCKARG: 1665aed02679SAndrey V. Elsukov bprintf(bp, " sockarg"); 1666aed02679SAndrey V. Elsukov break; 1667aed02679SAndrey V. Elsukov case O_IN: 1668aed02679SAndrey V. Elsukov bprintf(bp, cmd->len & F_NOT ? " out" : " in"); 1669aed02679SAndrey V. Elsukov break; 1670aed02679SAndrey V. Elsukov case O_DIVERTED: 1671aed02679SAndrey V. Elsukov switch (cmd->arg1) { 1672aed02679SAndrey V. Elsukov case 3: 1673aed02679SAndrey V. Elsukov bprintf(bp, " diverted"); 1674aed02679SAndrey V. Elsukov break; 1675aed02679SAndrey V. Elsukov case 2: 1676aed02679SAndrey V. Elsukov bprintf(bp, " diverted-output"); 1677aed02679SAndrey V. Elsukov break; 1678aed02679SAndrey V. Elsukov case 1: 1679aed02679SAndrey V. Elsukov bprintf(bp, " diverted-loopback"); 1680aed02679SAndrey V. Elsukov break; 1681aed02679SAndrey V. Elsukov default: 1682aed02679SAndrey V. Elsukov bprintf(bp, " diverted-?<%u>", cmd->arg1); 1683aed02679SAndrey V. Elsukov break; 1684aed02679SAndrey V. Elsukov } 1685aed02679SAndrey V. Elsukov break; 1686aed02679SAndrey V. Elsukov case O_LAYER2: 1687aed02679SAndrey V. Elsukov bprintf(bp, " layer2"); 1688aed02679SAndrey V. Elsukov break; 1689aed02679SAndrey V. Elsukov case O_XMIT: 1690aed02679SAndrey V. Elsukov case O_RECV: 1691aed02679SAndrey V. Elsukov case O_VIA: 1692aed02679SAndrey V. Elsukov if (cmd->opcode == O_XMIT) 1693aed02679SAndrey V. Elsukov s = "xmit"; 1694aed02679SAndrey V. Elsukov else if (cmd->opcode == O_RECV) 1695aed02679SAndrey V. Elsukov s = "recv"; 1696aed02679SAndrey V. Elsukov else /* if (cmd->opcode == O_VIA) */ 1697aed02679SAndrey V. Elsukov s = "via"; 1698aed02679SAndrey V. Elsukov switch (insntod(cmd, if)->name[0]) { 1699aed02679SAndrey V. Elsukov case '\0': 1700aed02679SAndrey V. Elsukov bprintf(bp, " %s %s", s, 1701aed02679SAndrey V. Elsukov inet_ntoa(insntod(cmd, if)->p.ip)); 1702aed02679SAndrey V. Elsukov break; 1703aed02679SAndrey V. Elsukov case '\1': 1704aed02679SAndrey V. Elsukov bprintf(bp, " %s table(%s)", s, 1705aed02679SAndrey V. Elsukov table_search_ctlv(fo->tstate, 1706aed02679SAndrey V. Elsukov insntod(cmd, if)->p.kidx)); 1707aed02679SAndrey V. Elsukov break; 1708aed02679SAndrey V. Elsukov default: 1709aed02679SAndrey V. Elsukov bprintf(bp, " %s %s", s, 1710aed02679SAndrey V. Elsukov insntod(cmd, if)->name); 1711aed02679SAndrey V. Elsukov } 1712aed02679SAndrey V. Elsukov break; 1713aed02679SAndrey V. Elsukov case O_IP_FLOW_LOOKUP: 1714aed02679SAndrey V. Elsukov s = table_search_ctlv(fo->tstate, cmd->arg1); 1715aed02679SAndrey V. Elsukov bprintf(bp, " flow table(%s", s); 1716aed02679SAndrey V. Elsukov if (F_LEN(cmd) == F_INSN_SIZE(ipfw_insn_u32)) 1717aed02679SAndrey V. Elsukov bprintf(bp, ",%u", insntod(cmd, u32)->d[0]); 1718aed02679SAndrey V. Elsukov bprintf(bp, ")"); 1719aed02679SAndrey V. Elsukov break; 1720aed02679SAndrey V. Elsukov case O_IPID: 1721aed02679SAndrey V. Elsukov case O_IPTTL: 1722aed02679SAndrey V. Elsukov case O_IPLEN: 1723aed02679SAndrey V. Elsukov case O_TCPDATALEN: 1724978f2d17SAndrey V. Elsukov case O_TCPMSS: 1725aed02679SAndrey V. Elsukov case O_TCPWIN: 1726aed02679SAndrey V. Elsukov if (F_LEN(cmd) == 1) { 1727aed02679SAndrey V. Elsukov switch (cmd->opcode) { 1728aed02679SAndrey V. Elsukov case O_IPID: 1729aed02679SAndrey V. Elsukov s = "ipid"; 1730aed02679SAndrey V. Elsukov break; 1731aed02679SAndrey V. Elsukov case O_IPTTL: 1732aed02679SAndrey V. Elsukov s = "ipttl"; 1733aed02679SAndrey V. Elsukov break; 1734aed02679SAndrey V. Elsukov case O_IPLEN: 1735aed02679SAndrey V. Elsukov s = "iplen"; 1736aed02679SAndrey V. Elsukov break; 1737aed02679SAndrey V. Elsukov case O_TCPDATALEN: 1738aed02679SAndrey V. Elsukov s = "tcpdatalen"; 1739aed02679SAndrey V. Elsukov break; 1740978f2d17SAndrey V. Elsukov case O_TCPMSS: 1741978f2d17SAndrey V. Elsukov s = "tcpmss"; 1742978f2d17SAndrey V. Elsukov break; 1743aed02679SAndrey V. Elsukov case O_TCPWIN: 1744aed02679SAndrey V. Elsukov s = "tcpwin"; 1745aed02679SAndrey V. Elsukov break; 1746268a20a0SAdrian Chadd default: 1747268a20a0SAdrian Chadd s = "<unknown>"; 1748268a20a0SAdrian Chadd break; 1749aed02679SAndrey V. Elsukov } 1750aed02679SAndrey V. Elsukov bprintf(bp, " %s %u", s, cmd->arg1); 1751aed02679SAndrey V. Elsukov } else 1752aed02679SAndrey V. Elsukov print_newports(bp, insntod(cmd, u16), 0, 1753aed02679SAndrey V. Elsukov cmd->opcode); 1754aed02679SAndrey V. Elsukov break; 1755aed02679SAndrey V. Elsukov case O_IPVER: 1756aed02679SAndrey V. Elsukov bprintf(bp, " ipver %u", cmd->arg1); 1757aed02679SAndrey V. Elsukov break; 1758aed02679SAndrey V. Elsukov case O_IPPRECEDENCE: 1759aed02679SAndrey V. Elsukov bprintf(bp, " ipprecedence %u", cmd->arg1 >> 5); 1760aed02679SAndrey V. Elsukov break; 1761aed02679SAndrey V. Elsukov case O_DSCP: 1762aed02679SAndrey V. Elsukov print_dscp(bp, insntod(cmd, u32)); 1763aed02679SAndrey V. Elsukov break; 1764aed02679SAndrey V. Elsukov case O_IPOPT: 1765aed02679SAndrey V. Elsukov print_flags(bp, "ipoptions", cmd, f_ipopts); 1766aed02679SAndrey V. Elsukov break; 1767aed02679SAndrey V. Elsukov case O_IPTOS: 1768aed02679SAndrey V. Elsukov print_flags(bp, "iptos", cmd, f_iptos); 1769aed02679SAndrey V. Elsukov break; 1770aed02679SAndrey V. Elsukov case O_ICMPTYPE: 1771aed02679SAndrey V. Elsukov print_icmptypes(bp, insntod(cmd, u32)); 1772aed02679SAndrey V. Elsukov break; 1773aed02679SAndrey V. Elsukov case O_ESTAB: 1774aed02679SAndrey V. Elsukov bprintf(bp, " established"); 1775aed02679SAndrey V. Elsukov break; 1776aed02679SAndrey V. Elsukov case O_TCPFLAGS: 1777aed02679SAndrey V. Elsukov print_flags(bp, "tcpflags", cmd, f_tcpflags); 1778aed02679SAndrey V. Elsukov break; 1779aed02679SAndrey V. Elsukov case O_TCPOPTS: 1780aed02679SAndrey V. Elsukov print_flags(bp, "tcpoptions", cmd, f_tcpopts); 1781aed02679SAndrey V. Elsukov break; 1782aed02679SAndrey V. Elsukov case O_TCPACK: 1783aed02679SAndrey V. Elsukov bprintf(bp, " tcpack %d", 1784aed02679SAndrey V. Elsukov ntohl(insntod(cmd, u32)->d[0])); 1785aed02679SAndrey V. Elsukov break; 1786aed02679SAndrey V. Elsukov case O_TCPSEQ: 1787aed02679SAndrey V. Elsukov bprintf(bp, " tcpseq %d", 1788aed02679SAndrey V. Elsukov ntohl(insntod(cmd, u32)->d[0])); 1789aed02679SAndrey V. Elsukov break; 1790aed02679SAndrey V. Elsukov case O_UID: 1791aed02679SAndrey V. Elsukov pwd = getpwuid(insntod(cmd, u32)->d[0]); 1792aed02679SAndrey V. Elsukov if (pwd != NULL) 1793aed02679SAndrey V. Elsukov bprintf(bp, " uid %s", pwd->pw_name); 1794aed02679SAndrey V. Elsukov else 1795aed02679SAndrey V. Elsukov bprintf(bp, " uid %u", 1796aed02679SAndrey V. Elsukov insntod(cmd, u32)->d[0]); 1797aed02679SAndrey V. Elsukov break; 1798aed02679SAndrey V. Elsukov case O_GID: 1799aed02679SAndrey V. Elsukov grp = getgrgid(insntod(cmd, u32)->d[0]); 1800aed02679SAndrey V. Elsukov if (grp != NULL) 1801aed02679SAndrey V. Elsukov bprintf(bp, " gid %s", grp->gr_name); 1802aed02679SAndrey V. Elsukov else 1803aed02679SAndrey V. Elsukov bprintf(bp, " gid %u", 1804aed02679SAndrey V. Elsukov insntod(cmd, u32)->d[0]); 1805aed02679SAndrey V. Elsukov break; 1806aed02679SAndrey V. Elsukov case O_JAIL: 1807aed02679SAndrey V. Elsukov bprintf(bp, " jail %d", insntod(cmd, u32)->d[0]); 1808aed02679SAndrey V. Elsukov break; 1809aed02679SAndrey V. Elsukov case O_VERREVPATH: 1810aed02679SAndrey V. Elsukov bprintf(bp, " verrevpath"); 1811aed02679SAndrey V. Elsukov break; 1812aed02679SAndrey V. Elsukov case O_VERSRCREACH: 1813aed02679SAndrey V. Elsukov bprintf(bp, " versrcreach"); 1814aed02679SAndrey V. Elsukov break; 1815aed02679SAndrey V. Elsukov case O_ANTISPOOF: 1816aed02679SAndrey V. Elsukov bprintf(bp, " antispoof"); 1817aed02679SAndrey V. Elsukov break; 1818aed02679SAndrey V. Elsukov case O_IPSEC: 1819aed02679SAndrey V. Elsukov bprintf(bp, " ipsec"); 1820aed02679SAndrey V. Elsukov break; 1821aed02679SAndrey V. Elsukov case O_NOP: 182256707beeSMark Johnston bprintf(bp, " // %s", (const char *)(cmd + 1)); 1823aed02679SAndrey V. Elsukov break; 1824aed02679SAndrey V. Elsukov case O_KEEP_STATE: 1825f7c4fdeeSAndrey V. Elsukov if (state->flags & HAVE_PROBE_STATE) 1826aed02679SAndrey V. Elsukov bprintf(bp, " keep-state"); 1827f7c4fdeeSAndrey V. Elsukov else 1828f7c4fdeeSAndrey V. Elsukov bprintf(bp, " record-state"); 1829aed02679SAndrey V. Elsukov bprintf(bp, " :%s", 1830aed02679SAndrey V. Elsukov object_search_ctlv(fo->tstate, cmd->arg1, 1831aed02679SAndrey V. Elsukov IPFW_TLV_STATE_NAME)); 1832aed02679SAndrey V. Elsukov break; 1833aed02679SAndrey V. Elsukov case O_LIMIT: 1834f7c4fdeeSAndrey V. Elsukov if (state->flags & HAVE_PROBE_STATE) 1835f7c4fdeeSAndrey V. Elsukov bprintf(bp, " limit"); 1836f7c4fdeeSAndrey V. Elsukov else 1837f7c4fdeeSAndrey V. Elsukov bprintf(bp, " set-limit"); 1838f7c4fdeeSAndrey V. Elsukov print_limit_mask(bp, insntod(cmd, limit)); 1839aed02679SAndrey V. Elsukov bprintf(bp, " :%s", 1840aed02679SAndrey V. Elsukov object_search_ctlv(fo->tstate, cmd->arg1, 1841aed02679SAndrey V. Elsukov IPFW_TLV_STATE_NAME)); 1842aed02679SAndrey V. Elsukov break; 1843aed02679SAndrey V. Elsukov case O_IP6: 1844761618deSAndrey V. Elsukov if (state->flags & HAVE_PROTO) 1845761618deSAndrey V. Elsukov bprintf(bp, " proto"); 1846aed02679SAndrey V. Elsukov bprintf(bp, " ip6"); 1847aed02679SAndrey V. Elsukov break; 1848aed02679SAndrey V. Elsukov case O_IP4: 1849761618deSAndrey V. Elsukov if (state->flags & HAVE_PROTO) 1850761618deSAndrey V. Elsukov bprintf(bp, " proto"); 1851aed02679SAndrey V. Elsukov bprintf(bp, " ip4"); 1852aed02679SAndrey V. Elsukov break; 1853aed02679SAndrey V. Elsukov case O_ICMP6TYPE: 1854aed02679SAndrey V. Elsukov print_icmp6types(bp, insntod(cmd, u32)); 1855aed02679SAndrey V. Elsukov break; 1856aed02679SAndrey V. Elsukov case O_EXT_HDR: 1857aed02679SAndrey V. Elsukov print_ext6hdr(bp, cmd); 1858aed02679SAndrey V. Elsukov break; 1859aed02679SAndrey V. Elsukov case O_TAGGED: 1860aed02679SAndrey V. Elsukov if (F_LEN(cmd) == 1) 1861aed02679SAndrey V. Elsukov bprint_uint_arg(bp, " tagged ", cmd->arg1); 1862aed02679SAndrey V. Elsukov else 1863aed02679SAndrey V. Elsukov print_newports(bp, insntod(cmd, u16), 1864aed02679SAndrey V. Elsukov 0, O_TAGGED); 1865aed02679SAndrey V. Elsukov break; 1866f7c4fdeeSAndrey V. Elsukov case O_SKIP_ACTION: 1867f7c4fdeeSAndrey V. Elsukov bprintf(bp, " defer-immediate-action"); 1868f7c4fdeeSAndrey V. Elsukov break; 1869fc727ad6SBoris Lytochkin case O_MARK: 1870fc727ad6SBoris Lytochkin bprintf(bp, " mark"); 1871fc727ad6SBoris Lytochkin if (cmd->arg1 == IP_FW_TARG) 1872fc727ad6SBoris Lytochkin bprintf(bp, " tablearg"); 1873fc727ad6SBoris Lytochkin else 1874fc727ad6SBoris Lytochkin bprintf(bp, " %#x", 1875fc727ad6SBoris Lytochkin ((const ipfw_insn_u32 *)cmd)->d[0]); 1876fc727ad6SBoris Lytochkin 1877fc727ad6SBoris Lytochkin if (((const ipfw_insn_u32 *)cmd)->d[1] != 0xFFFFFFFF) 1878fc727ad6SBoris Lytochkin bprintf(bp, ":%#x", 1879fc727ad6SBoris Lytochkin ((const ipfw_insn_u32 *)cmd)->d[1]); 1880fc727ad6SBoris Lytochkin break; 1881fc727ad6SBoris Lytochkin 1882aed02679SAndrey V. Elsukov default: 1883aed02679SAndrey V. Elsukov bprintf(bp, " [opcode %d len %d]", cmd->opcode, 1884aed02679SAndrey V. Elsukov cmd->len); 1885aed02679SAndrey V. Elsukov } 1886aed02679SAndrey V. Elsukov if (cmd->len & F_OR) { 1887aed02679SAndrey V. Elsukov bprintf(bp, " or"); 1888aed02679SAndrey V. Elsukov state->or_block = 1; 1889aed02679SAndrey V. Elsukov } else if (state->or_block != 0) { 1890aed02679SAndrey V. Elsukov bprintf(bp, " }"); 1891aed02679SAndrey V. Elsukov state->or_block = 0; 1892aed02679SAndrey V. Elsukov } 1893aed02679SAndrey V. Elsukov mark_printed(state, cmd); 1894aed02679SAndrey V. Elsukov 1895aed02679SAndrey V. Elsukov return (1); 1896aed02679SAndrey V. Elsukov } 1897aed02679SAndrey V. Elsukov 1898aed02679SAndrey V. Elsukov static ipfw_insn * 1899aed02679SAndrey V. Elsukov print_opcode(struct buf_pr *bp, struct format_opts *fo, 190051d5442fSAndrey V. Elsukov struct show_state *state, int opcode) 1901aed02679SAndrey V. Elsukov { 1902aed02679SAndrey V. Elsukov ipfw_insn *cmd; 1903aed02679SAndrey V. Elsukov int l; 1904aed02679SAndrey V. Elsukov 1905aed02679SAndrey V. Elsukov for (l = state->rule->act_ofs, cmd = state->rule->cmd; 1906aed02679SAndrey V. Elsukov l > 0; l -= F_LEN(cmd), cmd += F_LEN(cmd)) { 1907aed02679SAndrey V. Elsukov /* We use zero opcode to print the rest of options */ 190851d5442fSAndrey V. Elsukov if (opcode >= 0 && cmd->opcode != opcode) 1909aed02679SAndrey V. Elsukov continue; 1910aed02679SAndrey V. Elsukov /* 1911aed02679SAndrey V. Elsukov * Skip O_NOP, when we printing the rest 1912aed02679SAndrey V. Elsukov * of options, it will be handled separately. 1913aed02679SAndrey V. Elsukov */ 1914aed02679SAndrey V. Elsukov if (cmd->opcode == O_NOP && opcode != O_NOP) 1915aed02679SAndrey V. Elsukov continue; 1916aed02679SAndrey V. Elsukov if (!print_instruction(bp, fo, state, cmd)) 1917aed02679SAndrey V. Elsukov continue; 1918aed02679SAndrey V. Elsukov return (cmd); 1919aed02679SAndrey V. Elsukov } 1920aed02679SAndrey V. Elsukov return (NULL); 1921aed02679SAndrey V. Elsukov } 1922aed02679SAndrey V. Elsukov 1923aed02679SAndrey V. Elsukov static void 1924aed02679SAndrey V. Elsukov print_fwd(struct buf_pr *bp, const ipfw_insn *cmd) 1925aed02679SAndrey V. Elsukov { 1926aed02679SAndrey V. Elsukov char buf[INET6_ADDRSTRLEN + IF_NAMESIZE + 2]; 192756707beeSMark Johnston const ipfw_insn_sa6 *sa6; 192856707beeSMark Johnston const ipfw_insn_sa *sa; 1929aed02679SAndrey V. Elsukov uint16_t port; 1930aed02679SAndrey V. Elsukov 1931aed02679SAndrey V. Elsukov if (cmd->opcode == O_FORWARD_IP) { 1932aed02679SAndrey V. Elsukov sa = insntod(cmd, sa); 1933aed02679SAndrey V. Elsukov port = sa->sa.sin_port; 1934aed02679SAndrey V. Elsukov if (sa->sa.sin_addr.s_addr == INADDR_ANY) 1935aed02679SAndrey V. Elsukov bprintf(bp, "fwd tablearg"); 1936aed02679SAndrey V. Elsukov else 1937aed02679SAndrey V. Elsukov bprintf(bp, "fwd %s", inet_ntoa(sa->sa.sin_addr)); 1938aed02679SAndrey V. Elsukov } else { 1939aed02679SAndrey V. Elsukov sa6 = insntod(cmd, sa6); 1940aed02679SAndrey V. Elsukov port = sa6->sa.sin6_port; 1941aed02679SAndrey V. Elsukov bprintf(bp, "fwd "); 1942aed02679SAndrey V. Elsukov if (getnameinfo((const struct sockaddr *)&sa6->sa, 1943aed02679SAndrey V. Elsukov sizeof(struct sockaddr_in6), buf, sizeof(buf), NULL, 0, 1944aed02679SAndrey V. Elsukov NI_NUMERICHOST) == 0) 1945aed02679SAndrey V. Elsukov bprintf(bp, "%s", buf); 1946aed02679SAndrey V. Elsukov } 1947aed02679SAndrey V. Elsukov if (port != 0) 1948aed02679SAndrey V. Elsukov bprintf(bp, ",%u", port); 1949aed02679SAndrey V. Elsukov } 1950aed02679SAndrey V. Elsukov 1951aed02679SAndrey V. Elsukov static int 1952aed02679SAndrey V. Elsukov print_action_instruction(struct buf_pr *bp, const struct format_opts *fo, 1953aed02679SAndrey V. Elsukov struct show_state *state, const ipfw_insn *cmd) 1954aed02679SAndrey V. Elsukov { 1955aed02679SAndrey V. Elsukov const char *s; 1956aed02679SAndrey V. Elsukov 1957aed02679SAndrey V. Elsukov if (is_printed_opcode(state, cmd)) 1958aed02679SAndrey V. Elsukov return (0); 1959aed02679SAndrey V. Elsukov switch (cmd->opcode) { 1960aed02679SAndrey V. Elsukov case O_CHECK_STATE: 1961aed02679SAndrey V. Elsukov bprintf(bp, "check-state"); 1962aed02679SAndrey V. Elsukov if (cmd->arg1 != 0) 1963aed02679SAndrey V. Elsukov s = object_search_ctlv(fo->tstate, cmd->arg1, 1964aed02679SAndrey V. Elsukov IPFW_TLV_STATE_NAME); 1965aed02679SAndrey V. Elsukov else 1966aed02679SAndrey V. Elsukov s = NULL; 1967aed02679SAndrey V. Elsukov bprintf(bp, " :%s", s ? s: "any"); 1968aed02679SAndrey V. Elsukov break; 1969aed02679SAndrey V. Elsukov case O_ACCEPT: 1970aed02679SAndrey V. Elsukov bprintf(bp, "allow"); 1971aed02679SAndrey V. Elsukov break; 1972aed02679SAndrey V. Elsukov case O_COUNT: 1973aed02679SAndrey V. Elsukov bprintf(bp, "count"); 1974aed02679SAndrey V. Elsukov break; 1975aed02679SAndrey V. Elsukov case O_DENY: 1976aed02679SAndrey V. Elsukov bprintf(bp, "deny"); 1977aed02679SAndrey V. Elsukov break; 1978aed02679SAndrey V. Elsukov case O_REJECT: 1979aed02679SAndrey V. Elsukov if (cmd->arg1 == ICMP_REJECT_RST) 1980aed02679SAndrey V. Elsukov bprintf(bp, "reset"); 1981aed02679SAndrey V. Elsukov else if (cmd->arg1 == ICMP_REJECT_ABORT) 1982aed02679SAndrey V. Elsukov bprintf(bp, "abort"); 1983aed02679SAndrey V. Elsukov else if (cmd->arg1 == ICMP_UNREACH_HOST) 1984aed02679SAndrey V. Elsukov bprintf(bp, "reject"); 198505b9737fSGleb Smirnoff else if (cmd->arg1 == ICMP_UNREACH_NEEDFRAG && 198605b9737fSGleb Smirnoff cmd->len == F_INSN_SIZE(ipfw_insn_u16)) 198705b9737fSGleb Smirnoff bprintf(bp, "needfrag %u", 198805b9737fSGleb Smirnoff ((const ipfw_insn_u16 *)cmd)->ports[0]); 1989aed02679SAndrey V. Elsukov else 1990aed02679SAndrey V. Elsukov print_reject_code(bp, cmd->arg1); 1991aed02679SAndrey V. Elsukov break; 1992aed02679SAndrey V. Elsukov case O_UNREACH6: 1993aed02679SAndrey V. Elsukov if (cmd->arg1 == ICMP6_UNREACH_RST) 1994aed02679SAndrey V. Elsukov bprintf(bp, "reset6"); 1995aed02679SAndrey V. Elsukov else if (cmd->arg1 == ICMP6_UNREACH_ABORT) 1996aed02679SAndrey V. Elsukov bprintf(bp, "abort6"); 1997aed02679SAndrey V. Elsukov else 1998aed02679SAndrey V. Elsukov print_unreach6_code(bp, cmd->arg1); 1999aed02679SAndrey V. Elsukov break; 2000aed02679SAndrey V. Elsukov case O_SKIPTO: 2001aed02679SAndrey V. Elsukov bprint_uint_arg(bp, "skipto ", cmd->arg1); 2002aed02679SAndrey V. Elsukov break; 2003aed02679SAndrey V. Elsukov case O_PIPE: 2004aed02679SAndrey V. Elsukov bprint_uint_arg(bp, "pipe ", cmd->arg1); 2005aed02679SAndrey V. Elsukov break; 2006aed02679SAndrey V. Elsukov case O_QUEUE: 2007aed02679SAndrey V. Elsukov bprint_uint_arg(bp, "queue ", cmd->arg1); 2008aed02679SAndrey V. Elsukov break; 2009aed02679SAndrey V. Elsukov case O_DIVERT: 2010aed02679SAndrey V. Elsukov bprint_uint_arg(bp, "divert ", cmd->arg1); 2011aed02679SAndrey V. Elsukov break; 2012aed02679SAndrey V. Elsukov case O_TEE: 2013aed02679SAndrey V. Elsukov bprint_uint_arg(bp, "tee ", cmd->arg1); 2014aed02679SAndrey V. Elsukov break; 2015aed02679SAndrey V. Elsukov case O_NETGRAPH: 2016aed02679SAndrey V. Elsukov bprint_uint_arg(bp, "netgraph ", cmd->arg1); 2017aed02679SAndrey V. Elsukov break; 2018aed02679SAndrey V. Elsukov case O_NGTEE: 2019aed02679SAndrey V. Elsukov bprint_uint_arg(bp, "ngtee ", cmd->arg1); 2020aed02679SAndrey V. Elsukov break; 2021aed02679SAndrey V. Elsukov case O_FORWARD_IP: 2022aed02679SAndrey V. Elsukov case O_FORWARD_IP6: 2023aed02679SAndrey V. Elsukov print_fwd(bp, cmd); 2024aed02679SAndrey V. Elsukov break; 2025aed02679SAndrey V. Elsukov case O_LOG: 2026aed02679SAndrey V. Elsukov if (insntod(cmd, log)->max_log > 0) 2027aed02679SAndrey V. Elsukov bprintf(bp, " log logamount %d", 2028aed02679SAndrey V. Elsukov insntod(cmd, log)->max_log); 2029aed02679SAndrey V. Elsukov else 2030aed02679SAndrey V. Elsukov bprintf(bp, " log"); 2031aed02679SAndrey V. Elsukov break; 2032aed02679SAndrey V. Elsukov case O_ALTQ: 2033aed02679SAndrey V. Elsukov #ifndef NO_ALTQ 2034aed02679SAndrey V. Elsukov print_altq_cmd(bp, insntod(cmd, altq)); 2035aed02679SAndrey V. Elsukov #endif 2036aed02679SAndrey V. Elsukov break; 2037aed02679SAndrey V. Elsukov case O_TAG: 2038aed02679SAndrey V. Elsukov bprint_uint_arg(bp, cmd->len & F_NOT ? " untag ": 2039aed02679SAndrey V. Elsukov " tag ", cmd->arg1); 2040aed02679SAndrey V. Elsukov break; 2041aed02679SAndrey V. Elsukov case O_NAT: 2042aed02679SAndrey V. Elsukov if (cmd->arg1 != IP_FW_NAT44_GLOBAL) 2043aed02679SAndrey V. Elsukov bprint_uint_arg(bp, "nat ", cmd->arg1); 2044aed02679SAndrey V. Elsukov else 2045aed02679SAndrey V. Elsukov bprintf(bp, "nat global"); 2046aed02679SAndrey V. Elsukov break; 2047aed02679SAndrey V. Elsukov case O_SETFIB: 2048aed02679SAndrey V. Elsukov if (cmd->arg1 == IP_FW_TARG) 2049aed02679SAndrey V. Elsukov bprint_uint_arg(bp, "setfib ", cmd->arg1); 2050aed02679SAndrey V. Elsukov else 2051aed02679SAndrey V. Elsukov bprintf(bp, "setfib %u", cmd->arg1 & 0x7FFF); 2052aed02679SAndrey V. Elsukov break; 2053aed02679SAndrey V. Elsukov case O_EXTERNAL_ACTION: 2054aed02679SAndrey V. Elsukov /* 2055aed02679SAndrey V. Elsukov * The external action can consists of two following 2056aed02679SAndrey V. Elsukov * each other opcodes - O_EXTERNAL_ACTION and 2057aed02679SAndrey V. Elsukov * O_EXTERNAL_INSTANCE. The first contains the ID of 2058aed02679SAndrey V. Elsukov * name of external action. The second contains the ID 2059aed02679SAndrey V. Elsukov * of name of external action instance. 2060aed02679SAndrey V. Elsukov * NOTE: in case when external action has no named 2061aed02679SAndrey V. Elsukov * instances support, the second opcode isn't needed. 2062aed02679SAndrey V. Elsukov */ 2063aed02679SAndrey V. Elsukov state->eaction = cmd; 2064aed02679SAndrey V. Elsukov s = object_search_ctlv(fo->tstate, cmd->arg1, 2065aed02679SAndrey V. Elsukov IPFW_TLV_EACTION); 2066aed02679SAndrey V. Elsukov if (match_token(rule_eactions, s) != -1) 2067aed02679SAndrey V. Elsukov bprintf(bp, "%s", s); 2068aed02679SAndrey V. Elsukov else 2069aed02679SAndrey V. Elsukov bprintf(bp, "eaction %s", s); 2070aed02679SAndrey V. Elsukov break; 2071aed02679SAndrey V. Elsukov case O_EXTERNAL_INSTANCE: 2072aed02679SAndrey V. Elsukov if (state->eaction == NULL) 2073aed02679SAndrey V. Elsukov break; 2074aed02679SAndrey V. Elsukov /* 2075aed02679SAndrey V. Elsukov * XXX: we need to teach ipfw(9) to rewrite opcodes 2076aed02679SAndrey V. Elsukov * in the user buffer on rule addition. When we add 2077aed02679SAndrey V. Elsukov * the rule, we specify zero TLV type for 2078aed02679SAndrey V. Elsukov * O_EXTERNAL_INSTANCE object. To show correct 2079aed02679SAndrey V. Elsukov * rule after `ipfw add` we need to search instance 2080aed02679SAndrey V. Elsukov * name with zero type. But when we do `ipfw show` 2081aed02679SAndrey V. Elsukov * we calculate TLV type using IPFW_TLV_EACTION_NAME() 2082aed02679SAndrey V. Elsukov * macro. 2083aed02679SAndrey V. Elsukov */ 2084aed02679SAndrey V. Elsukov s = object_search_ctlv(fo->tstate, cmd->arg1, 0); 2085aed02679SAndrey V. Elsukov if (s == NULL) 2086aed02679SAndrey V. Elsukov s = object_search_ctlv(fo->tstate, 2087aed02679SAndrey V. Elsukov cmd->arg1, IPFW_TLV_EACTION_NAME( 2088aed02679SAndrey V. Elsukov state->eaction->arg1)); 2089aed02679SAndrey V. Elsukov bprintf(bp, " %s", s); 2090aed02679SAndrey V. Elsukov break; 2091aed02679SAndrey V. Elsukov case O_EXTERNAL_DATA: 2092aed02679SAndrey V. Elsukov if (state->eaction == NULL) 2093aed02679SAndrey V. Elsukov break; 2094aed02679SAndrey V. Elsukov /* 2095aed02679SAndrey V. Elsukov * Currently we support data formatting only for 2096aed02679SAndrey V. Elsukov * external data with datalen u16. For unknown data 2097aed02679SAndrey V. Elsukov * print its size in bytes. 2098aed02679SAndrey V. Elsukov */ 2099aed02679SAndrey V. Elsukov if (cmd->len == F_INSN_SIZE(ipfw_insn)) 2100aed02679SAndrey V. Elsukov bprintf(bp, " %u", cmd->arg1); 2101aed02679SAndrey V. Elsukov else 2102aed02679SAndrey V. Elsukov bprintf(bp, " %ubytes", 2103aed02679SAndrey V. Elsukov cmd->len * sizeof(uint32_t)); 2104aed02679SAndrey V. Elsukov break; 2105aed02679SAndrey V. Elsukov case O_SETDSCP: 2106aed02679SAndrey V. Elsukov if (cmd->arg1 == IP_FW_TARG) { 2107aed02679SAndrey V. Elsukov bprintf(bp, "setdscp tablearg"); 2108aed02679SAndrey V. Elsukov break; 2109aed02679SAndrey V. Elsukov } 2110aed02679SAndrey V. Elsukov s = match_value(f_ipdscp, cmd->arg1 & 0x3F); 2111aed02679SAndrey V. Elsukov if (s != NULL) 2112aed02679SAndrey V. Elsukov bprintf(bp, "setdscp %s", s); 2113aed02679SAndrey V. Elsukov else 2114427dc1f7SAndrey V. Elsukov bprintf(bp, "setdscp %u", cmd->arg1 & 0x3F); 2115aed02679SAndrey V. Elsukov break; 2116aed02679SAndrey V. Elsukov case O_REASS: 2117aed02679SAndrey V. Elsukov bprintf(bp, "reass"); 2118aed02679SAndrey V. Elsukov break; 2119aed02679SAndrey V. Elsukov case O_CALLRETURN: 2120aed02679SAndrey V. Elsukov if (cmd->len & F_NOT) 2121aed02679SAndrey V. Elsukov bprintf(bp, "return"); 2122aed02679SAndrey V. Elsukov else 2123aed02679SAndrey V. Elsukov bprint_uint_arg(bp, "call ", cmd->arg1); 2124aed02679SAndrey V. Elsukov break; 2125fc727ad6SBoris Lytochkin case O_SETMARK: 2126fc727ad6SBoris Lytochkin if (cmd->arg1 == IP_FW_TARG) { 2127fc727ad6SBoris Lytochkin bprintf(bp, "setmark tablearg"); 2128fc727ad6SBoris Lytochkin break; 2129fc727ad6SBoris Lytochkin } 2130fc727ad6SBoris Lytochkin bprintf(bp, "setmark %#x", ((const ipfw_insn_u32 *)cmd)->d[0]); 2131fc727ad6SBoris Lytochkin break; 2132aed02679SAndrey V. Elsukov default: 2133aed02679SAndrey V. Elsukov bprintf(bp, "** unrecognized action %d len %d ", 2134aed02679SAndrey V. Elsukov cmd->opcode, cmd->len); 2135aed02679SAndrey V. Elsukov } 2136aed02679SAndrey V. Elsukov mark_printed(state, cmd); 2137aed02679SAndrey V. Elsukov 2138aed02679SAndrey V. Elsukov return (1); 2139aed02679SAndrey V. Elsukov } 2140aed02679SAndrey V. Elsukov 2141aed02679SAndrey V. Elsukov 2142aed02679SAndrey V. Elsukov static ipfw_insn * 2143aed02679SAndrey V. Elsukov print_action(struct buf_pr *bp, struct format_opts *fo, 2144aed02679SAndrey V. Elsukov struct show_state *state, uint8_t opcode) 2145aed02679SAndrey V. Elsukov { 2146aed02679SAndrey V. Elsukov ipfw_insn *cmd; 2147aed02679SAndrey V. Elsukov int l; 2148aed02679SAndrey V. Elsukov 2149aed02679SAndrey V. Elsukov for (l = state->rule->cmd_len - state->rule->act_ofs, 2150aed02679SAndrey V. Elsukov cmd = ACTION_PTR(state->rule); l > 0; 2151aed02679SAndrey V. Elsukov l -= F_LEN(cmd), cmd += F_LEN(cmd)) { 2152aed02679SAndrey V. Elsukov if (cmd->opcode != opcode) 2153aed02679SAndrey V. Elsukov continue; 2154aed02679SAndrey V. Elsukov if (!print_action_instruction(bp, fo, state, cmd)) 2155aed02679SAndrey V. Elsukov continue; 2156aed02679SAndrey V. Elsukov return (cmd); 2157aed02679SAndrey V. Elsukov } 2158aed02679SAndrey V. Elsukov return (NULL); 2159aed02679SAndrey V. Elsukov } 2160aed02679SAndrey V. Elsukov 2161aed02679SAndrey V. Elsukov static void 2162aed02679SAndrey V. Elsukov print_proto(struct buf_pr *bp, struct format_opts *fo, 2163aed02679SAndrey V. Elsukov struct show_state *state) 2164aed02679SAndrey V. Elsukov { 2165aed02679SAndrey V. Elsukov ipfw_insn *cmd; 2166a895c1c2SAndrey V. Elsukov int l, proto, ip4, ip6; 2167aed02679SAndrey V. Elsukov 2168aed02679SAndrey V. Elsukov /* Count all O_PROTO, O_IP4, O_IP6 instructions. */ 2169a895c1c2SAndrey V. Elsukov proto = ip4 = ip6 = 0; 2170aed02679SAndrey V. Elsukov for (l = state->rule->act_ofs, cmd = state->rule->cmd; 2171aed02679SAndrey V. Elsukov l > 0; l -= F_LEN(cmd), cmd += F_LEN(cmd)) { 2172aed02679SAndrey V. Elsukov switch (cmd->opcode) { 2173aed02679SAndrey V. Elsukov case O_PROTO: 2174aed02679SAndrey V. Elsukov proto++; 2175aed02679SAndrey V. Elsukov break; 2176aed02679SAndrey V. Elsukov case O_IP4: 2177aed02679SAndrey V. Elsukov ip4 = 1; 2178aed02679SAndrey V. Elsukov if (cmd->len & F_OR) 2179aed02679SAndrey V. Elsukov ip4++; 2180aed02679SAndrey V. Elsukov break; 2181aed02679SAndrey V. Elsukov case O_IP6: 2182aed02679SAndrey V. Elsukov ip6 = 1; 2183aed02679SAndrey V. Elsukov if (cmd->len & F_OR) 2184aed02679SAndrey V. Elsukov ip6++; 2185aed02679SAndrey V. Elsukov break; 2186aed02679SAndrey V. Elsukov default: 2187aed02679SAndrey V. Elsukov continue; 2188aed02679SAndrey V. Elsukov } 2189aed02679SAndrey V. Elsukov } 2190aed02679SAndrey V. Elsukov if (proto == 0 && ip4 == 0 && ip6 == 0) { 2191aed02679SAndrey V. Elsukov state->proto = IPPROTO_IP; 2192aed02679SAndrey V. Elsukov state->flags |= HAVE_PROTO; 21934df4dadaSAlexander V. Chernikov bprintf(bp, " ip"); 2194aed02679SAndrey V. Elsukov return; 2195daa9733aSLuigi Rizzo } 2196aed02679SAndrey V. Elsukov /* To handle the case { ip4 or ip6 }, print opcode with F_OR first */ 2197aed02679SAndrey V. Elsukov cmd = NULL; 2198aed02679SAndrey V. Elsukov if (ip4 || ip6) 2199aed02679SAndrey V. Elsukov cmd = print_opcode(bp, fo, state, ip4 > ip6 ? O_IP4: O_IP6); 2200aed02679SAndrey V. Elsukov if (cmd != NULL && (cmd->len & F_OR)) 2201aed02679SAndrey V. Elsukov cmd = print_opcode(bp, fo, state, ip4 > ip6 ? O_IP6: O_IP4); 2202aed02679SAndrey V. Elsukov if (cmd == NULL || (cmd->len & F_OR)) 2203aed02679SAndrey V. Elsukov for (l = proto; l > 0; l--) { 2204aed02679SAndrey V. Elsukov cmd = print_opcode(bp, fo, state, O_PROTO); 2205a895c1c2SAndrey V. Elsukov if (cmd == NULL || (cmd->len & F_OR) == 0) 2206aed02679SAndrey V. Elsukov break; 2207e706181bSLuigi Rizzo } 2208aed02679SAndrey V. Elsukov /* Initialize proto, it is used by print_newports() */ 2209aed02679SAndrey V. Elsukov state->flags |= HAVE_PROTO; 2210a895c1c2SAndrey V. Elsukov if (state->proto == 0 && ip6 != 0) 2211a895c1c2SAndrey V. Elsukov state->proto = IPPROTO_IPV6; 22129758b77fSLuigi Rizzo } 22139758b77fSLuigi Rizzo 2214aed02679SAndrey V. Elsukov static int 2215aed02679SAndrey V. Elsukov match_opcode(int opcode, const int opcodes[], size_t nops) 2216aed02679SAndrey V. Elsukov { 221756707beeSMark Johnston size_t i; 2218aed02679SAndrey V. Elsukov 2219aed02679SAndrey V. Elsukov for (i = 0; i < nops; i++) 2220aed02679SAndrey V. Elsukov if (opcode == opcodes[i]) 2221aed02679SAndrey V. Elsukov return (1); 2222aed02679SAndrey V. Elsukov return (0); 2223aed02679SAndrey V. Elsukov } 2224aed02679SAndrey V. Elsukov 2225aed02679SAndrey V. Elsukov static void 2226aed02679SAndrey V. Elsukov print_address(struct buf_pr *bp, struct format_opts *fo, 2227aed02679SAndrey V. Elsukov struct show_state *state, const int opcodes[], size_t nops, int portop, 2228aed02679SAndrey V. Elsukov int flag) 2229aed02679SAndrey V. Elsukov { 2230aed02679SAndrey V. Elsukov ipfw_insn *cmd; 2231aed02679SAndrey V. Elsukov int count, l, portcnt, pf; 2232aed02679SAndrey V. Elsukov 2233aed02679SAndrey V. Elsukov count = portcnt = 0; 2234aed02679SAndrey V. Elsukov for (l = state->rule->act_ofs, cmd = state->rule->cmd; 2235aed02679SAndrey V. Elsukov l > 0; l -= F_LEN(cmd), cmd += F_LEN(cmd)) { 2236aed02679SAndrey V. Elsukov if (match_opcode(cmd->opcode, opcodes, nops)) 2237aed02679SAndrey V. Elsukov count++; 2238aed02679SAndrey V. Elsukov else if (cmd->opcode == portop) 2239aed02679SAndrey V. Elsukov portcnt++; 2240aed02679SAndrey V. Elsukov } 2241aed02679SAndrey V. Elsukov if (count == 0) 2242aed02679SAndrey V. Elsukov bprintf(bp, " any"); 2243aed02679SAndrey V. Elsukov for (l = state->rule->act_ofs, cmd = state->rule->cmd; 2244aed02679SAndrey V. Elsukov l > 0 && count > 0; l -= F_LEN(cmd), cmd += F_LEN(cmd)) { 2245aed02679SAndrey V. Elsukov if (!match_opcode(cmd->opcode, opcodes, nops)) 2246aed02679SAndrey V. Elsukov continue; 2247aed02679SAndrey V. Elsukov print_instruction(bp, fo, state, cmd); 2248aed02679SAndrey V. Elsukov if ((cmd->len & F_OR) == 0) 2249aed02679SAndrey V. Elsukov break; 2250aed02679SAndrey V. Elsukov count--; 2251aed02679SAndrey V. Elsukov } 2252aed02679SAndrey V. Elsukov /* 2253aed02679SAndrey V. Elsukov * If several O_IP_?PORT opcodes specified, leave them to the 2254aed02679SAndrey V. Elsukov * options section. 2255aed02679SAndrey V. Elsukov */ 2256aed02679SAndrey V. Elsukov if (portcnt == 1) { 2257aed02679SAndrey V. Elsukov for (l = state->rule->act_ofs, cmd = state->rule->cmd, pf = 0; 2258aed02679SAndrey V. Elsukov l > 0; l -= F_LEN(cmd), cmd += F_LEN(cmd)) { 2259aed02679SAndrey V. Elsukov if (cmd->opcode != portop) { 2260aed02679SAndrey V. Elsukov pf = (cmd->len & F_OR); 2261aed02679SAndrey V. Elsukov continue; 2262aed02679SAndrey V. Elsukov } 2263aed02679SAndrey V. Elsukov /* Print opcode iff it is not in OR block. */ 2264aed02679SAndrey V. Elsukov if (pf == 0 && (cmd->len & F_OR) == 0) 2265aed02679SAndrey V. Elsukov print_instruction(bp, fo, state, cmd); 2266aed02679SAndrey V. Elsukov break; 2267aed02679SAndrey V. Elsukov } 2268aed02679SAndrey V. Elsukov } 2269aed02679SAndrey V. Elsukov state->flags |= flag; 2270aed02679SAndrey V. Elsukov } 2271aed02679SAndrey V. Elsukov 2272aed02679SAndrey V. Elsukov static const int action_opcodes[] = { 2273aed02679SAndrey V. Elsukov O_CHECK_STATE, O_ACCEPT, O_COUNT, O_DENY, O_REJECT, 2274aed02679SAndrey V. Elsukov O_UNREACH6, O_SKIPTO, O_PIPE, O_QUEUE, O_DIVERT, O_TEE, 2275aed02679SAndrey V. Elsukov O_NETGRAPH, O_NGTEE, O_FORWARD_IP, O_FORWARD_IP6, O_NAT, 2276fc727ad6SBoris Lytochkin O_SETFIB, O_SETDSCP, O_REASS, O_CALLRETURN, O_SETMARK, 2277aed02679SAndrey V. Elsukov /* keep the following opcodes at the end of the list */ 2278aed02679SAndrey V. Elsukov O_EXTERNAL_ACTION, O_EXTERNAL_INSTANCE, O_EXTERNAL_DATA 2279aed02679SAndrey V. Elsukov }; 2280aed02679SAndrey V. Elsukov 2281aed02679SAndrey V. Elsukov static const int modifier_opcodes[] = { 2282aed02679SAndrey V. Elsukov O_LOG, O_ALTQ, O_TAG 2283aed02679SAndrey V. Elsukov }; 2284aed02679SAndrey V. Elsukov 2285aed02679SAndrey V. Elsukov static const int src_opcodes[] = { 2286aed02679SAndrey V. Elsukov O_IP_SRC, O_IP_SRC_LOOKUP, O_IP_SRC_MASK, O_IP_SRC_ME, 2287aed02679SAndrey V. Elsukov O_IP_SRC_SET, O_IP6_SRC, O_IP6_SRC_MASK, O_IP6_SRC_ME 2288aed02679SAndrey V. Elsukov }; 2289aed02679SAndrey V. Elsukov 2290aed02679SAndrey V. Elsukov static const int dst_opcodes[] = { 2291aed02679SAndrey V. Elsukov O_IP_DST, O_IP_DST_LOOKUP, O_IP_DST_MASK, O_IP_DST_ME, 2292aed02679SAndrey V. Elsukov O_IP_DST_SET, O_IP6_DST, O_IP6_DST_MASK, O_IP6_DST_ME 2293aed02679SAndrey V. Elsukov }; 2294aed02679SAndrey V. Elsukov 22959758b77fSLuigi Rizzo static void 2296563b5ab1SAlexander V. Chernikov show_static_rule(struct cmdline_opts *co, struct format_opts *fo, 22977e767c79SAlexander V. Chernikov struct buf_pr *bp, struct ip_fw_rule *rule, struct ip_fw_bcounter *cntr) 22989758b77fSLuigi Rizzo { 229956707beeSMark Johnston static int twidth = 0; 2300aed02679SAndrey V. Elsukov struct show_state state; 2301aed02679SAndrey V. Elsukov ipfw_insn *cmd; 230256707beeSMark Johnston size_t i; 23039758b77fSLuigi Rizzo 2304aed02679SAndrey V. Elsukov /* Print # DISABLED or skip the rule */ 23057e767c79SAlexander V. Chernikov if ((fo->set_mask & (1 << rule->set)) == 0) { 23067e767c79SAlexander V. Chernikov /* disabled mask */ 2307563b5ab1SAlexander V. Chernikov if (!co->show_sets) 230843405724SLuigi Rizzo return; 230943405724SLuigi Rizzo else 2310563b5ab1SAlexander V. Chernikov bprintf(bp, "# DISABLED "); 231143405724SLuigi Rizzo } 2312aed02679SAndrey V. Elsukov if (init_show_state(&state, rule) != 0) { 2313aed02679SAndrey V. Elsukov warn("init_show_state() failed"); 2314aed02679SAndrey V. Elsukov return; 2315aed02679SAndrey V. Elsukov } 2316563b5ab1SAlexander V. Chernikov bprintf(bp, "%05u ", rule->rulenum); 23179758b77fSLuigi Rizzo 2318bf7cc0f9SLutz Donnerhacke /* only if counters are available */ 2319bf7cc0f9SLutz Donnerhacke if (cntr != NULL) { 23207e767c79SAlexander V. Chernikov /* Print counters if enabled */ 2321563b5ab1SAlexander V. Chernikov if (fo->pcwidth > 0 || fo->bcwidth > 0) { 23227e767c79SAlexander V. Chernikov pr_u64(bp, &cntr->pcnt, fo->pcwidth); 23237e767c79SAlexander V. Chernikov pr_u64(bp, &cntr->bcnt, fo->bcwidth); 232437133ba7SLuigi Rizzo } 23259758b77fSLuigi Rizzo 2326aed02679SAndrey V. Elsukov /* Print timestamp */ 2327aed02679SAndrey V. Elsukov if (co->do_time == TIMESTAMP_NUMERIC) 23287e767c79SAlexander V. Chernikov bprintf(bp, "%10u ", cntr->timestamp); 2329aed02679SAndrey V. Elsukov else if (co->do_time == TIMESTAMP_STRING) { 23309758b77fSLuigi Rizzo char timestr[30]; 23313d2209aeSGiorgos Keramidas time_t t = (time_t)0; 23323d2209aeSGiorgos Keramidas 23333d2209aeSGiorgos Keramidas if (twidth == 0) { 23343d2209aeSGiorgos Keramidas strcpy(timestr, ctime(&t)); 23353d2209aeSGiorgos Keramidas *strchr(timestr, '\n') = '\0'; 23363d2209aeSGiorgos Keramidas twidth = strlen(timestr); 23373d2209aeSGiorgos Keramidas } 23387e767c79SAlexander V. Chernikov if (cntr->timestamp > 0) { 23397e767c79SAlexander V. Chernikov t = _long_to_time(cntr->timestamp); 23409758b77fSLuigi Rizzo 23419758b77fSLuigi Rizzo strcpy(timestr, ctime(&t)); 23429758b77fSLuigi Rizzo *strchr(timestr, '\n') = '\0'; 2343563b5ab1SAlexander V. Chernikov bprintf(bp, "%s ", timestr); 23449758b77fSLuigi Rizzo } else { 23450fa427feSStefan Eßer bprintf(bp, "%*s ", twidth, ""); 23469758b77fSLuigi Rizzo } 23479758b77fSLuigi Rizzo } 2348bf7cc0f9SLutz Donnerhacke } 23499758b77fSLuigi Rizzo 2350aed02679SAndrey V. Elsukov /* Print set number */ 2351563b5ab1SAlexander V. Chernikov if (co->show_sets) 2352563b5ab1SAlexander V. Chernikov bprintf(bp, "set %d ", rule->set); 235343405724SLuigi Rizzo 2354aed02679SAndrey V. Elsukov /* Print the optional "match probability" */ 2355aed02679SAndrey V. Elsukov cmd = print_opcode(bp, fo, &state, O_PROB); 2356aed02679SAndrey V. Elsukov /* Print rule action */ 2357aed02679SAndrey V. Elsukov for (i = 0; i < nitems(action_opcodes); i++) { 2358aed02679SAndrey V. Elsukov cmd = print_action(bp, fo, &state, action_opcodes[i]); 2359aed02679SAndrey V. Elsukov if (cmd == NULL) 2360aed02679SAndrey V. Elsukov continue; 2361aed02679SAndrey V. Elsukov /* Handle special cases */ 23629758b77fSLuigi Rizzo switch (cmd->opcode) { 23639758b77fSLuigi Rizzo case O_CHECK_STATE: 2364aed02679SAndrey V. Elsukov goto end; 2365aed02679SAndrey V. Elsukov case O_EXTERNAL_ACTION: 2366aed02679SAndrey V. Elsukov case O_EXTERNAL_INSTANCE: 2367aed02679SAndrey V. Elsukov /* External action can have several instructions */ 236857cd6d26SMax Laier continue; 2369aed02679SAndrey V. Elsukov } 237057cd6d26SMax Laier break; 237157cd6d26SMax Laier } 2372aed02679SAndrey V. Elsukov /* Print rule modifiers */ 2373aed02679SAndrey V. Elsukov for (i = 0; i < nitems(modifier_opcodes); i++) 2374aed02679SAndrey V. Elsukov print_action(bp, fo, &state, modifier_opcodes[i]); 2375aed02679SAndrey V. Elsukov /* 2376aed02679SAndrey V. Elsukov * Print rule body 2377aed02679SAndrey V. Elsukov */ 2378aed02679SAndrey V. Elsukov if (co->comment_only != 0) 2379aed02679SAndrey V. Elsukov goto end; 2380094d6f8dSAndrey V. Elsukov 2381094d6f8dSAndrey V. Elsukov if (rule->flags & IPFW_RULE_JUSTOPTS) { 2382094d6f8dSAndrey V. Elsukov state.flags |= HAVE_PROTO | HAVE_SRCIP | HAVE_DSTIP; 2383094d6f8dSAndrey V. Elsukov goto justopts; 2384094d6f8dSAndrey V. Elsukov } 2385094d6f8dSAndrey V. Elsukov 2386aed02679SAndrey V. Elsukov print_proto(bp, fo, &state); 238755507128SAndrey V. Elsukov if (co->do_compact != 0 && (rule->flags & IPFW_RULE_NOOPT)) 238855507128SAndrey V. Elsukov goto justopts; 2389e706181bSLuigi Rizzo 2390aed02679SAndrey V. Elsukov /* Print source */ 23914df4dadaSAlexander V. Chernikov bprintf(bp, " from"); 2392aed02679SAndrey V. Elsukov print_address(bp, fo, &state, src_opcodes, nitems(src_opcodes), 2393aed02679SAndrey V. Elsukov O_IP_SRCPORT, HAVE_SRCIP); 23949758b77fSLuigi Rizzo 2395aed02679SAndrey V. Elsukov /* Print destination */ 23964df4dadaSAlexander V. Chernikov bprintf(bp, " to"); 2397aed02679SAndrey V. Elsukov print_address(bp, fo, &state, dst_opcodes, nitems(dst_opcodes), 2398aed02679SAndrey V. Elsukov O_IP_DSTPORT, HAVE_DSTIP); 23999758b77fSLuigi Rizzo 2400094d6f8dSAndrey V. Elsukov justopts: 2401aed02679SAndrey V. Elsukov /* Print the rest of options */ 240251d5442fSAndrey V. Elsukov while (print_opcode(bp, fo, &state, -1)) 2403aed02679SAndrey V. Elsukov ; 2404aed02679SAndrey V. Elsukov end: 2405aed02679SAndrey V. Elsukov /* Print comment at the end */ 2406aed02679SAndrey V. Elsukov cmd = print_opcode(bp, fo, &state, O_NOP); 2407aed02679SAndrey V. Elsukov if (co->comment_only != 0 && cmd == NULL) 2408aed02679SAndrey V. Elsukov bprintf(bp, " // ..."); 24094df4dadaSAlexander V. Chernikov bprintf(bp, "\n"); 2410aed02679SAndrey V. Elsukov free_show_state(&state); 24119758b77fSLuigi Rizzo } 24129758b77fSLuigi Rizzo 24139758b77fSLuigi Rizzo static void 2414563b5ab1SAlexander V. Chernikov show_dyn_state(struct cmdline_opts *co, struct format_opts *fo, 2415563b5ab1SAlexander V. Chernikov struct buf_pr *bp, ipfw_dyn_rule *d) 24169758b77fSLuigi Rizzo { 24179758b77fSLuigi Rizzo struct protoent *pe; 24189758b77fSLuigi Rizzo struct in_addr a; 2419330462a3SBernd Walter uint16_t rulenum; 242081bd0dc0SMax Laier char buf[INET6_ADDRSTRLEN]; 24219758b77fSLuigi Rizzo 2422d66f9c86SAndrey V. Elsukov if (d->expire == 0 && d->dyn_type != O_LIMIT_PARENT) 24239758b77fSLuigi Rizzo return; 2424d66f9c86SAndrey V. Elsukov 2425330462a3SBernd Walter bcopy(&d->rule, &rulenum, sizeof(rulenum)); 2426563b5ab1SAlexander V. Chernikov bprintf(bp, "%05d", rulenum); 2427563b5ab1SAlexander V. Chernikov if (fo->pcwidth > 0 || fo->bcwidth > 0) { 2428563b5ab1SAlexander V. Chernikov bprintf(bp, " "); 2429563b5ab1SAlexander V. Chernikov pr_u64(bp, &d->pcnt, fo->pcwidth); 2430563b5ab1SAlexander V. Chernikov pr_u64(bp, &d->bcnt, fo->bcwidth); 2431563b5ab1SAlexander V. Chernikov bprintf(bp, "(%ds)", d->expire); 243237133ba7SLuigi Rizzo } 24339758b77fSLuigi Rizzo switch (d->dyn_type) { 24349758b77fSLuigi Rizzo case O_LIMIT_PARENT: 2435563b5ab1SAlexander V. Chernikov bprintf(bp, " PARENT %d", d->count); 24369758b77fSLuigi Rizzo break; 24379758b77fSLuigi Rizzo case O_LIMIT: 2438563b5ab1SAlexander V. Chernikov bprintf(bp, " LIMIT"); 24399758b77fSLuigi Rizzo break; 24409758b77fSLuigi Rizzo case O_KEEP_STATE: /* bidir, no mask */ 2441563b5ab1SAlexander V. Chernikov bprintf(bp, " STATE"); 24429758b77fSLuigi Rizzo break; 24439758b77fSLuigi Rizzo } 24449758b77fSLuigi Rizzo 24459758b77fSLuigi Rizzo if ((pe = getprotobynumber(d->id.proto)) != NULL) 2446563b5ab1SAlexander V. Chernikov bprintf(bp, " %s", pe->p_name); 24479758b77fSLuigi Rizzo else 2448563b5ab1SAlexander V. Chernikov bprintf(bp, " proto %u", d->id.proto); 24499758b77fSLuigi Rizzo 245081bd0dc0SMax Laier if (d->id.addr_type == 4) { 24519758b77fSLuigi Rizzo a.s_addr = htonl(d->id.src_ip); 2452563b5ab1SAlexander V. Chernikov bprintf(bp, " %s %d", inet_ntoa(a), d->id.src_port); 24539758b77fSLuigi Rizzo 24549758b77fSLuigi Rizzo a.s_addr = htonl(d->id.dst_ip); 2455563b5ab1SAlexander V. Chernikov bprintf(bp, " <-> %s %d", inet_ntoa(a), d->id.dst_port); 245681bd0dc0SMax Laier } else if (d->id.addr_type == 6) { 2457563b5ab1SAlexander V. Chernikov bprintf(bp, " %s %d", inet_ntop(AF_INET6, &d->id.src_ip6, buf, 245881bd0dc0SMax Laier sizeof(buf)), d->id.src_port); 2459563b5ab1SAlexander V. Chernikov bprintf(bp, " <-> %s %d", inet_ntop(AF_INET6, &d->id.dst_ip6, 2460563b5ab1SAlexander V. Chernikov buf, sizeof(buf)), d->id.dst_port); 246181bd0dc0SMax Laier } else 2462ed22e564SAndrey V. Elsukov bprintf(bp, " UNKNOWN <-> UNKNOWN"); 2463ed22e564SAndrey V. Elsukov if (d->kidx != 0) 24646ed14738SAndrey V. Elsukov bprintf(bp, " :%s", object_search_ctlv(fo->tstate, 2465ed22e564SAndrey V. Elsukov d->kidx, IPFW_TLV_STATE_NAME)); 2466d66f9c86SAndrey V. Elsukov 2467d66f9c86SAndrey V. Elsukov #define BOTH_SYN (TH_SYN | (TH_SYN << 8)) 2468d66f9c86SAndrey V. Elsukov #define BOTH_FIN (TH_FIN | (TH_FIN << 8)) 2469d66f9c86SAndrey V. Elsukov if (co->verbose) { 2470d66f9c86SAndrey V. Elsukov bprintf(bp, " state 0x%08x%s", d->state, 2471d66f9c86SAndrey V. Elsukov d->state ? " ": ","); 2472d66f9c86SAndrey V. Elsukov if (d->state & IPFW_DYN_ORPHANED) 2473d66f9c86SAndrey V. Elsukov bprintf(bp, "ORPHANED,"); 2474d66f9c86SAndrey V. Elsukov if ((d->state & BOTH_SYN) == BOTH_SYN) 2475d66f9c86SAndrey V. Elsukov bprintf(bp, "BOTH_SYN,"); 2476d66f9c86SAndrey V. Elsukov else { 2477d66f9c86SAndrey V. Elsukov if (d->state & TH_SYN) 2478d66f9c86SAndrey V. Elsukov bprintf(bp, "F_SYN,"); 2479d66f9c86SAndrey V. Elsukov if (d->state & (TH_SYN << 8)) 2480d66f9c86SAndrey V. Elsukov bprintf(bp, "R_SYN,"); 2481d66f9c86SAndrey V. Elsukov } 2482d66f9c86SAndrey V. Elsukov if ((d->state & BOTH_FIN) == BOTH_FIN) 2483d66f9c86SAndrey V. Elsukov bprintf(bp, "BOTH_FIN,"); 2484d66f9c86SAndrey V. Elsukov else { 2485d66f9c86SAndrey V. Elsukov if (d->state & TH_FIN) 2486d66f9c86SAndrey V. Elsukov bprintf(bp, "F_FIN,"); 2487d66f9c86SAndrey V. Elsukov if (d->state & (TH_FIN << 8)) 2488d66f9c86SAndrey V. Elsukov bprintf(bp, "R_FIN,"); 2489d66f9c86SAndrey V. Elsukov } 2490d66f9c86SAndrey V. Elsukov bprintf(bp, " f_ack 0x%x, r_ack 0x%x", d->ack_fwd, 2491d66f9c86SAndrey V. Elsukov d->ack_rev); 2492d66f9c86SAndrey V. Elsukov } 24939758b77fSLuigi Rizzo } 24949758b77fSLuigi Rizzo 2495a73d728dSAlexander V. Chernikov static int 2496a73d728dSAlexander V. Chernikov do_range_cmd(int cmd, ipfw_range_tlv *rt) 2497a73d728dSAlexander V. Chernikov { 2498a73d728dSAlexander V. Chernikov ipfw_range_header rh; 249960f485caSAlexander V. Chernikov size_t sz; 2500a73d728dSAlexander V. Chernikov 2501a73d728dSAlexander V. Chernikov memset(&rh, 0, sizeof(rh)); 2502a73d728dSAlexander V. Chernikov memcpy(&rh.range, rt, sizeof(*rt)); 2503a73d728dSAlexander V. Chernikov rh.range.head.length = sizeof(*rt); 2504a73d728dSAlexander V. Chernikov rh.range.head.type = IPFW_TLV_RANGE; 250560f485caSAlexander V. Chernikov sz = sizeof(rh); 2506a73d728dSAlexander V. Chernikov 250760f485caSAlexander V. Chernikov if (do_get3(cmd, &rh.opheader, &sz) != 0) 250860f485caSAlexander V. Chernikov return (-1); 250960f485caSAlexander V. Chernikov /* Save number of matched objects */ 251060f485caSAlexander V. Chernikov rt->new_set = rh.range.new_set; 251160f485caSAlexander V. Chernikov return (0); 2512a73d728dSAlexander V. Chernikov } 2513a73d728dSAlexander V. Chernikov 251499e5e645SLuigi Rizzo /* 251599e5e645SLuigi Rizzo * This one handles all set-related commands 251699e5e645SLuigi Rizzo * ipfw set { show | enable | disable } 251799e5e645SLuigi Rizzo * ipfw set swap X Y 251899e5e645SLuigi Rizzo * ipfw set move X to Y 251999e5e645SLuigi Rizzo * ipfw set move rule X to Y 252099e5e645SLuigi Rizzo */ 25213c0c8717SLuigi Rizzo void 2522cc4d3c30SLuigi Rizzo ipfw_sets_handler(char *av[]) 252399e5e645SLuigi Rizzo { 2524a73d728dSAlexander V. Chernikov ipfw_range_tlv rt; 252556707beeSMark Johnston const char *msg; 2526ac35ff17SAlexander V. Chernikov size_t size; 2527c690824aSAndrey V. Elsukov uint32_t masks[2]; 2528c690824aSAndrey V. Elsukov int i; 2529c690824aSAndrey V. Elsukov uint16_t rulenum; 2530c690824aSAndrey V. Elsukov uint8_t cmd; 253199e5e645SLuigi Rizzo 253299e5e645SLuigi Rizzo av++; 2533a73d728dSAlexander V. Chernikov memset(&rt, 0, sizeof(rt)); 253499e5e645SLuigi Rizzo 2535cc4d3c30SLuigi Rizzo if (av[0] == NULL) 253699e5e645SLuigi Rizzo errx(EX_USAGE, "set needs command"); 253701750186SBrooks Davis if (_substrcmp(*av, "show") == 0) { 2538ac35ff17SAlexander V. Chernikov struct format_opts fo; 2539ac35ff17SAlexander V. Chernikov ipfw_cfg_lheader *cfg; 254099e5e645SLuigi Rizzo 2541ac35ff17SAlexander V. Chernikov memset(&fo, 0, sizeof(fo)); 254256707beeSMark Johnston if (ipfw_get_config(&g_co, &fo, &cfg, &size) != 0) 2543ac35ff17SAlexander V. Chernikov err(EX_OSERR, "requesting config failed"); 2544330462a3SBernd Walter 25453004afcaSLuigi Rizzo for (i = 0, msg = "disable"; i < RESVD_SET; i++) 2546ac35ff17SAlexander V. Chernikov if ((cfg->set_mask & (1<<i)) == 0) { 254799e5e645SLuigi Rizzo printf("%s %d", msg, i); 254899e5e645SLuigi Rizzo msg = ""; 254999e5e645SLuigi Rizzo } 2550ac35ff17SAlexander V. Chernikov msg = (cfg->set_mask != (uint32_t)-1) ? " enable" : "enable"; 25513004afcaSLuigi Rizzo for (i = 0; i < RESVD_SET; i++) 2552ac35ff17SAlexander V. Chernikov if ((cfg->set_mask & (1<<i)) != 0) { 255399e5e645SLuigi Rizzo printf("%s %d", msg, i); 255499e5e645SLuigi Rizzo msg = ""; 255599e5e645SLuigi Rizzo } 255699e5e645SLuigi Rizzo printf("\n"); 2557ac35ff17SAlexander V. Chernikov free(cfg); 255801750186SBrooks Davis } else if (_substrcmp(*av, "swap") == 0) { 2559cc4d3c30SLuigi Rizzo av++; 2560cc4d3c30SLuigi Rizzo if ( av[0] == NULL || av[1] == NULL ) 256199e5e645SLuigi Rizzo errx(EX_USAGE, "set swap needs 2 set numbers\n"); 2562a73d728dSAlexander V. Chernikov rt.set = atoi(av[0]); 2563a73d728dSAlexander V. Chernikov rt.new_set = atoi(av[1]); 2564a73d728dSAlexander V. Chernikov if (!isdigit(*(av[0])) || rt.set > RESVD_SET) 256599e5e645SLuigi Rizzo errx(EX_DATAERR, "invalid set number %s\n", av[0]); 2566a73d728dSAlexander V. Chernikov if (!isdigit(*(av[1])) || rt.new_set > RESVD_SET) 256799e5e645SLuigi Rizzo errx(EX_DATAERR, "invalid set number %s\n", av[1]); 2568a73d728dSAlexander V. Chernikov i = do_range_cmd(IP_FW_SET_SWAP, &rt); 256901750186SBrooks Davis } else if (_substrcmp(*av, "move") == 0) { 2570cc4d3c30SLuigi Rizzo av++; 2571c751221aSLuigi Rizzo if (av[0] && _substrcmp(*av, "rule") == 0) { 2572a73d728dSAlexander V. Chernikov rt.flags = IPFW_RCFLAG_RANGE; /* move rules to new set */ 2573a73d728dSAlexander V. Chernikov cmd = IP_FW_XMOVE; 2574cc4d3c30SLuigi Rizzo av++; 257599e5e645SLuigi Rizzo } else 2576a73d728dSAlexander V. Chernikov cmd = IP_FW_SET_MOVE; /* Move set to new one */ 2577cc4d3c30SLuigi Rizzo if (av[0] == NULL || av[1] == NULL || av[2] == NULL || 2578cc4d3c30SLuigi Rizzo av[3] != NULL || _substrcmp(av[1], "to") != 0) 257999e5e645SLuigi Rizzo errx(EX_USAGE, "syntax: set move [rule] X to Y\n"); 258099e5e645SLuigi Rizzo rulenum = atoi(av[0]); 2581a73d728dSAlexander V. Chernikov rt.new_set = atoi(av[2]); 2582a73d728dSAlexander V. Chernikov if (cmd == IP_FW_XMOVE) { 2583a73d728dSAlexander V. Chernikov rt.start_rule = rulenum; 2584a73d728dSAlexander V. Chernikov rt.end_rule = rulenum; 2585a73d728dSAlexander V. Chernikov } else 2586a73d728dSAlexander V. Chernikov rt.set = rulenum; 2587a73d728dSAlexander V. Chernikov rt.new_set = atoi(av[2]); 2588a73d728dSAlexander V. Chernikov if (!isdigit(*(av[0])) || (cmd == 3 && rt.set > RESVD_SET) || 2589a73d728dSAlexander V. Chernikov (cmd == 2 && rt.start_rule == IPFW_DEFAULT_RULE) ) 259099e5e645SLuigi Rizzo errx(EX_DATAERR, "invalid source number %s\n", av[0]); 2591d3de6c1dSAlexander V. Chernikov if (!isdigit(*(av[2])) || rt.new_set > RESVD_SET) 259299e5e645SLuigi Rizzo errx(EX_DATAERR, "invalid dest. set %s\n", av[1]); 2593a73d728dSAlexander V. Chernikov i = do_range_cmd(cmd, &rt); 25942685841bSAndrey V. Elsukov if (i < 0) 25952685841bSAndrey V. Elsukov err(EX_OSERR, "failed to move %s", 25962685841bSAndrey V. Elsukov cmd == IP_FW_SET_MOVE ? "set": "rule"); 259701750186SBrooks Davis } else if (_substrcmp(*av, "disable") == 0 || 259801750186SBrooks Davis _substrcmp(*av, "enable") == 0 ) { 259901750186SBrooks Davis int which = _substrcmp(*av, "enable") == 0 ? 1 : 0; 260099e5e645SLuigi Rizzo 2601cc4d3c30SLuigi Rizzo av++; 260299e5e645SLuigi Rizzo masks[0] = masks[1] = 0; 260399e5e645SLuigi Rizzo 2604c751221aSLuigi Rizzo while (av[0]) { 260599e5e645SLuigi Rizzo if (isdigit(**av)) { 260699e5e645SLuigi Rizzo i = atoi(*av); 26073004afcaSLuigi Rizzo if (i < 0 || i > RESVD_SET) 260899e5e645SLuigi Rizzo errx(EX_DATAERR, 260999e5e645SLuigi Rizzo "invalid set number %d\n", i); 261099e5e645SLuigi Rizzo masks[which] |= (1<<i); 261101750186SBrooks Davis } else if (_substrcmp(*av, "disable") == 0) 261299e5e645SLuigi Rizzo which = 0; 261301750186SBrooks Davis else if (_substrcmp(*av, "enable") == 0) 261499e5e645SLuigi Rizzo which = 1; 261599e5e645SLuigi Rizzo else 261699e5e645SLuigi Rizzo errx(EX_DATAERR, 261799e5e645SLuigi Rizzo "invalid set command %s\n", *av); 2618cc4d3c30SLuigi Rizzo av++; 261999e5e645SLuigi Rizzo } 262099e5e645SLuigi Rizzo if ( (masks[0] & masks[1]) != 0 ) 262199e5e645SLuigi Rizzo errx(EX_DATAERR, 262299e5e645SLuigi Rizzo "cannot enable and disable the same set\n"); 262399e5e645SLuigi Rizzo 2624a73d728dSAlexander V. Chernikov rt.set = masks[0]; 2625a73d728dSAlexander V. Chernikov rt.new_set = masks[1]; 2626a73d728dSAlexander V. Chernikov i = do_range_cmd(IP_FW_SET_ENABLE, &rt); 262799e5e645SLuigi Rizzo if (i) 2628a73d728dSAlexander V. Chernikov warn("set enable/disable: setsockopt(IP_FW_SET_ENABLE)"); 262999e5e645SLuigi Rizzo } else 263099e5e645SLuigi Rizzo errx(EX_USAGE, "invalid set command %s\n", *av); 263199e5e645SLuigi Rizzo } 263299e5e645SLuigi Rizzo 26333c0c8717SLuigi Rizzo void 2634cc4d3c30SLuigi Rizzo ipfw_sysctl_handler(char *av[], int which) 26356690be9eSMatthew Dillon { 26366690be9eSMatthew Dillon av++; 26376690be9eSMatthew Dillon 2638cc4d3c30SLuigi Rizzo if (av[0] == NULL) { 26396690be9eSMatthew Dillon warnx("missing keyword to enable/disable\n"); 264001750186SBrooks Davis } else if (_substrcmp(*av, "firewall") == 0) { 264129c1402aSLuigi Rizzo sysctlbyname("net.inet.ip.fw.enable", NULL, 0, 264229c1402aSLuigi Rizzo &which, sizeof(which)); 2643c323a5faSHajimu UMEMOTO sysctlbyname("net.inet6.ip6.fw.enable", NULL, 0, 2644c323a5faSHajimu UMEMOTO &which, sizeof(which)); 264501750186SBrooks Davis } else if (_substrcmp(*av, "one_pass") == 0) { 264629c1402aSLuigi Rizzo sysctlbyname("net.inet.ip.fw.one_pass", NULL, 0, 264729c1402aSLuigi Rizzo &which, sizeof(which)); 264801750186SBrooks Davis } else if (_substrcmp(*av, "debug") == 0) { 264929c1402aSLuigi Rizzo sysctlbyname("net.inet.ip.fw.debug", NULL, 0, 265029c1402aSLuigi Rizzo &which, sizeof(which)); 265101750186SBrooks Davis } else if (_substrcmp(*av, "verbose") == 0) { 265229c1402aSLuigi Rizzo sysctlbyname("net.inet.ip.fw.verbose", NULL, 0, 265329c1402aSLuigi Rizzo &which, sizeof(which)); 265401750186SBrooks Davis } else if (_substrcmp(*av, "dyn_keepalive") == 0) { 265529c1402aSLuigi Rizzo sysctlbyname("net.inet.ip.fw.dyn_keepalive", NULL, 0, 265629c1402aSLuigi Rizzo &which, sizeof(which)); 2657cc4d3c30SLuigi Rizzo #ifndef NO_ALTQ 265801750186SBrooks Davis } else if (_substrcmp(*av, "altq") == 0) { 2659974dfe30SBrian Feldman altq_set_enabled(which); 2660cc4d3c30SLuigi Rizzo #endif 26616690be9eSMatthew Dillon } else { 26626690be9eSMatthew Dillon warnx("unrecognize enable/disable keyword: %s\n", *av); 26636690be9eSMatthew Dillon } 26646690be9eSMatthew Dillon } 26656690be9eSMatthew Dillon 26666447bae6SAlexander V. Chernikov typedef void state_cb(struct cmdline_opts *co, struct format_opts *fo, 26676447bae6SAlexander V. Chernikov void *arg, void *state); 26686447bae6SAlexander V. Chernikov 26696447bae6SAlexander V. Chernikov static void 26706447bae6SAlexander V. Chernikov prepare_format_dyn(struct cmdline_opts *co, struct format_opts *fo, 267156707beeSMark Johnston void *arg __unused, void *_state) 26726447bae6SAlexander V. Chernikov { 26736447bae6SAlexander V. Chernikov ipfw_dyn_rule *d; 26746447bae6SAlexander V. Chernikov int width; 26756447bae6SAlexander V. Chernikov uint8_t set; 26766447bae6SAlexander V. Chernikov 26776447bae6SAlexander V. Chernikov d = (ipfw_dyn_rule *)_state; 26786447bae6SAlexander V. Chernikov /* Count _ALL_ states */ 26796447bae6SAlexander V. Chernikov fo->dcnt++; 26806447bae6SAlexander V. Chernikov 26817e767c79SAlexander V. Chernikov if (fo->show_counters == 0) 26827e767c79SAlexander V. Chernikov return; 26837e767c79SAlexander V. Chernikov 26846447bae6SAlexander V. Chernikov if (co->use_set) { 26856447bae6SAlexander V. Chernikov /* skip states from another set */ 26866447bae6SAlexander V. Chernikov bcopy((char *)&d->rule + sizeof(uint16_t), &set, 26876447bae6SAlexander V. Chernikov sizeof(uint8_t)); 26886447bae6SAlexander V. Chernikov if (set != co->use_set - 1) 26896447bae6SAlexander V. Chernikov return; 26906447bae6SAlexander V. Chernikov } 26916447bae6SAlexander V. Chernikov 26926447bae6SAlexander V. Chernikov width = pr_u64(NULL, &d->pcnt, 0); 26936447bae6SAlexander V. Chernikov if (width > fo->pcwidth) 26946447bae6SAlexander V. Chernikov fo->pcwidth = width; 26956447bae6SAlexander V. Chernikov 26966447bae6SAlexander V. Chernikov width = pr_u64(NULL, &d->bcnt, 0); 26976447bae6SAlexander V. Chernikov if (width > fo->bcwidth) 26986447bae6SAlexander V. Chernikov fo->bcwidth = width; 26996447bae6SAlexander V. Chernikov } 27006447bae6SAlexander V. Chernikov 27016447bae6SAlexander V. Chernikov static int 27026447bae6SAlexander V. Chernikov foreach_state(struct cmdline_opts *co, struct format_opts *fo, 27036447bae6SAlexander V. Chernikov caddr_t base, size_t sz, state_cb dyn_bc, void *dyn_arg) 27046447bae6SAlexander V. Chernikov { 27056447bae6SAlexander V. Chernikov int ttype; 27066447bae6SAlexander V. Chernikov state_cb *fptr; 27076447bae6SAlexander V. Chernikov void *farg; 27086447bae6SAlexander V. Chernikov ipfw_obj_tlv *tlv; 27096447bae6SAlexander V. Chernikov ipfw_obj_ctlv *ctlv; 27106447bae6SAlexander V. Chernikov 27116447bae6SAlexander V. Chernikov fptr = NULL; 27126447bae6SAlexander V. Chernikov ttype = 0; 27136447bae6SAlexander V. Chernikov 27146447bae6SAlexander V. Chernikov while (sz > 0) { 27156447bae6SAlexander V. Chernikov ctlv = (ipfw_obj_ctlv *)base; 27166447bae6SAlexander V. Chernikov switch (ctlv->head.type) { 27176447bae6SAlexander V. Chernikov case IPFW_TLV_DYNSTATE_LIST: 27186447bae6SAlexander V. Chernikov base += sizeof(*ctlv); 27196447bae6SAlexander V. Chernikov sz -= sizeof(*ctlv); 27206447bae6SAlexander V. Chernikov ttype = IPFW_TLV_DYN_ENT; 27216447bae6SAlexander V. Chernikov fptr = dyn_bc; 27226447bae6SAlexander V. Chernikov farg = dyn_arg; 27236447bae6SAlexander V. Chernikov break; 27246447bae6SAlexander V. Chernikov default: 27256447bae6SAlexander V. Chernikov return (sz); 27266447bae6SAlexander V. Chernikov } 27276447bae6SAlexander V. Chernikov 27286447bae6SAlexander V. Chernikov while (sz > 0) { 27296447bae6SAlexander V. Chernikov tlv = (ipfw_obj_tlv *)base; 27306447bae6SAlexander V. Chernikov if (tlv->type != ttype) 27316447bae6SAlexander V. Chernikov break; 27326447bae6SAlexander V. Chernikov 27336447bae6SAlexander V. Chernikov fptr(co, fo, farg, tlv + 1); 27346447bae6SAlexander V. Chernikov sz -= tlv->length; 27356447bae6SAlexander V. Chernikov base += tlv->length; 27366447bae6SAlexander V. Chernikov } 27376447bae6SAlexander V. Chernikov } 27386447bae6SAlexander V. Chernikov 27396447bae6SAlexander V. Chernikov return (sz); 27406447bae6SAlexander V. Chernikov } 27416447bae6SAlexander V. Chernikov 2742563b5ab1SAlexander V. Chernikov static void 2743563b5ab1SAlexander V. Chernikov prepare_format_opts(struct cmdline_opts *co, struct format_opts *fo, 27447e767c79SAlexander V. Chernikov ipfw_obj_tlv *rtlv, int rcnt, caddr_t dynbase, size_t dynsz) 2745563b5ab1SAlexander V. Chernikov { 2746563b5ab1SAlexander V. Chernikov int bcwidth, pcwidth, width; 2747563b5ab1SAlexander V. Chernikov int n; 27487e767c79SAlexander V. Chernikov struct ip_fw_bcounter *cntr; 27497e767c79SAlexander V. Chernikov struct ip_fw_rule *r; 2750563b5ab1SAlexander V. Chernikov 2751563b5ab1SAlexander V. Chernikov bcwidth = 0; 2752563b5ab1SAlexander V. Chernikov pcwidth = 0; 2753563b5ab1SAlexander V. Chernikov if (fo->show_counters != 0) { 27547e767c79SAlexander V. Chernikov for (n = 0; n < rcnt; n++, 27557e767c79SAlexander V. Chernikov rtlv = (ipfw_obj_tlv *)((caddr_t)rtlv + rtlv->length)) { 27567e767c79SAlexander V. Chernikov cntr = (struct ip_fw_bcounter *)(rtlv + 1); 27577e767c79SAlexander V. Chernikov r = (struct ip_fw_rule *)((caddr_t)cntr + cntr->size); 2758563b5ab1SAlexander V. Chernikov /* skip rules from another set */ 2759563b5ab1SAlexander V. Chernikov if (co->use_set && r->set != co->use_set - 1) 2760563b5ab1SAlexander V. Chernikov continue; 2761563b5ab1SAlexander V. Chernikov 2762563b5ab1SAlexander V. Chernikov /* packet counter */ 27637e767c79SAlexander V. Chernikov width = pr_u64(NULL, &cntr->pcnt, 0); 2764563b5ab1SAlexander V. Chernikov if (width > pcwidth) 2765563b5ab1SAlexander V. Chernikov pcwidth = width; 2766563b5ab1SAlexander V. Chernikov 2767563b5ab1SAlexander V. Chernikov /* byte counter */ 27687e767c79SAlexander V. Chernikov width = pr_u64(NULL, &cntr->bcnt, 0); 2769563b5ab1SAlexander V. Chernikov if (width > bcwidth) 2770563b5ab1SAlexander V. Chernikov bcwidth = width; 2771563b5ab1SAlexander V. Chernikov } 2772563b5ab1SAlexander V. Chernikov } 2773563b5ab1SAlexander V. Chernikov fo->bcwidth = bcwidth; 2774563b5ab1SAlexander V. Chernikov fo->pcwidth = pcwidth; 27756447bae6SAlexander V. Chernikov 27766447bae6SAlexander V. Chernikov fo->dcnt = 0; 27777e767c79SAlexander V. Chernikov if (co->do_dynamic && dynsz > 0) 27787e767c79SAlexander V. Chernikov foreach_state(co, fo, dynbase, dynsz, prepare_format_dyn, NULL); 2779563b5ab1SAlexander V. Chernikov } 2780563b5ab1SAlexander V. Chernikov 2781563b5ab1SAlexander V. Chernikov static int 27826447bae6SAlexander V. Chernikov list_static_range(struct cmdline_opts *co, struct format_opts *fo, 27837e767c79SAlexander V. Chernikov struct buf_pr *bp, ipfw_obj_tlv *rtlv, int rcnt) 2784563b5ab1SAlexander V. Chernikov { 2785563b5ab1SAlexander V. Chernikov int n, seen; 27867e767c79SAlexander V. Chernikov struct ip_fw_rule *r; 27877e767c79SAlexander V. Chernikov struct ip_fw_bcounter *cntr; 2788563b5ab1SAlexander V. Chernikov 27897e767c79SAlexander V. Chernikov for (n = seen = 0; n < rcnt; n++, 27907e767c79SAlexander V. Chernikov rtlv = (ipfw_obj_tlv *)((caddr_t)rtlv + rtlv->length)) { 27917e767c79SAlexander V. Chernikov 27925d439467SAlexander V. Chernikov if ((fo->show_counters | fo->show_time) != 0) { 27937e767c79SAlexander V. Chernikov cntr = (struct ip_fw_bcounter *)(rtlv + 1); 27947e767c79SAlexander V. Chernikov r = (struct ip_fw_rule *)((caddr_t)cntr + cntr->size); 27957e767c79SAlexander V. Chernikov } else { 27967e767c79SAlexander V. Chernikov cntr = NULL; 27977e767c79SAlexander V. Chernikov r = (struct ip_fw_rule *)(rtlv + 1); 27987e767c79SAlexander V. Chernikov } 2799563b5ab1SAlexander V. Chernikov if (r->rulenum > fo->last) 2800563b5ab1SAlexander V. Chernikov break; 2801563b5ab1SAlexander V. Chernikov if (co->use_set && r->set != co->use_set - 1) 2802563b5ab1SAlexander V. Chernikov continue; 2803563b5ab1SAlexander V. Chernikov if (r->rulenum >= fo->first && r->rulenum <= fo->last) { 28047e767c79SAlexander V. Chernikov show_static_rule(co, fo, bp, r, cntr); 28054df4dadaSAlexander V. Chernikov printf("%s", bp->buf); 2806563b5ab1SAlexander V. Chernikov bp_flush(bp); 2807563b5ab1SAlexander V. Chernikov seen++; 2808563b5ab1SAlexander V. Chernikov } 2809563b5ab1SAlexander V. Chernikov } 2810563b5ab1SAlexander V. Chernikov 2811563b5ab1SAlexander V. Chernikov return (seen); 2812563b5ab1SAlexander V. Chernikov } 2813563b5ab1SAlexander V. Chernikov 2814563b5ab1SAlexander V. Chernikov static void 28156447bae6SAlexander V. Chernikov list_dyn_state(struct cmdline_opts *co, struct format_opts *fo, 28166447bae6SAlexander V. Chernikov void *_arg, void *_state) 2817563b5ab1SAlexander V. Chernikov { 2818563b5ab1SAlexander V. Chernikov uint16_t rulenum; 28196447bae6SAlexander V. Chernikov uint8_t set; 28206447bae6SAlexander V. Chernikov ipfw_dyn_rule *d; 28216447bae6SAlexander V. Chernikov struct buf_pr *bp; 2822563b5ab1SAlexander V. Chernikov 28236447bae6SAlexander V. Chernikov d = (ipfw_dyn_rule *)_state; 28246447bae6SAlexander V. Chernikov bp = (struct buf_pr *)_arg; 28256447bae6SAlexander V. Chernikov 2826563b5ab1SAlexander V. Chernikov bcopy(&d->rule, &rulenum, sizeof(rulenum)); 2827563b5ab1SAlexander V. Chernikov if (rulenum > fo->last) 28286447bae6SAlexander V. Chernikov return; 2829563b5ab1SAlexander V. Chernikov if (co->use_set) { 2830563b5ab1SAlexander V. Chernikov bcopy((char *)&d->rule + sizeof(uint16_t), 2831563b5ab1SAlexander V. Chernikov &set, sizeof(uint8_t)); 28326447bae6SAlexander V. Chernikov if (set != co->use_set - 1) 28336447bae6SAlexander V. Chernikov return; 28342aa75134SAlexander V. Chernikov } 2835563b5ab1SAlexander V. Chernikov if (rulenum >= fo->first) { 2836563b5ab1SAlexander V. Chernikov show_dyn_state(co, fo, bp, d); 2837563b5ab1SAlexander V. Chernikov printf("%s\n", bp->buf); 2838563b5ab1SAlexander V. Chernikov bp_flush(bp); 2839563b5ab1SAlexander V. Chernikov } 2840563b5ab1SAlexander V. Chernikov } 28416447bae6SAlexander V. Chernikov 28426447bae6SAlexander V. Chernikov static int 28436447bae6SAlexander V. Chernikov list_dyn_range(struct cmdline_opts *co, struct format_opts *fo, 28446447bae6SAlexander V. Chernikov struct buf_pr *bp, caddr_t base, size_t sz) 28456447bae6SAlexander V. Chernikov { 28466447bae6SAlexander V. Chernikov 28476447bae6SAlexander V. Chernikov sz = foreach_state(co, fo, base, sz, list_dyn_state, bp); 28486447bae6SAlexander V. Chernikov return (sz); 2849563b5ab1SAlexander V. Chernikov } 2850563b5ab1SAlexander V. Chernikov 28513c0c8717SLuigi Rizzo void 28523c0c8717SLuigi Rizzo ipfw_list(int ac, char *av[], int show_counters) 28539758b77fSLuigi Rizzo { 2854563b5ab1SAlexander V. Chernikov ipfw_cfg_lheader *cfg; 2855563b5ab1SAlexander V. Chernikov struct format_opts sfo; 2856563b5ab1SAlexander V. Chernikov size_t sz; 2857563b5ab1SAlexander V. Chernikov int error; 28582aa75134SAlexander V. Chernikov int lac; 28592aa75134SAlexander V. Chernikov char **lav; 28602aa75134SAlexander V. Chernikov uint32_t rnum; 28612aa75134SAlexander V. Chernikov char *endptr; 286200ed6609SMaxim Konovalov 286356707beeSMark Johnston if (g_co.test_only) { 2864571f8c1bSLuigi Rizzo fprintf(stderr, "Testing only, list disabled\n"); 2865571f8c1bSLuigi Rizzo return; 2866571f8c1bSLuigi Rizzo } 286756707beeSMark Johnston if (g_co.do_pipe) { 2868cc4d3c30SLuigi Rizzo dummynet_list(ac, av, show_counters); 2869cc4d3c30SLuigi Rizzo return; 2870cc4d3c30SLuigi Rizzo } 2871571f8c1bSLuigi Rizzo 28729758b77fSLuigi Rizzo ac--; 28739758b77fSLuigi Rizzo av++; 28742aa75134SAlexander V. Chernikov memset(&sfo, 0, sizeof(sfo)); 28752aa75134SAlexander V. Chernikov 28762aa75134SAlexander V. Chernikov /* Determine rule range to request */ 28772aa75134SAlexander V. Chernikov if (ac > 0) { 28782aa75134SAlexander V. Chernikov for (lac = ac, lav = av; lac != 0; lac--) { 28792aa75134SAlexander V. Chernikov rnum = strtoul(*lav++, &endptr, 10); 28802aa75134SAlexander V. Chernikov if (sfo.first == 0 || rnum < sfo.first) 28812aa75134SAlexander V. Chernikov sfo.first = rnum; 28822aa75134SAlexander V. Chernikov 28832aa75134SAlexander V. Chernikov if (*endptr == '-') 28842aa75134SAlexander V. Chernikov rnum = strtoul(endptr + 1, &endptr, 10); 28852aa75134SAlexander V. Chernikov if (sfo.last == 0 || rnum > sfo.last) 28862aa75134SAlexander V. Chernikov sfo.last = rnum; 28872aa75134SAlexander V. Chernikov } 28882aa75134SAlexander V. Chernikov } 28899758b77fSLuigi Rizzo 2890e4861dc8SElyes Haouas /* get configuration from kernel */ 2891563b5ab1SAlexander V. Chernikov cfg = NULL; 28927e767c79SAlexander V. Chernikov sfo.show_counters = show_counters; 289356707beeSMark Johnston sfo.show_time = g_co.do_time; 289456707beeSMark Johnston if (g_co.do_dynamic != 2) 2895d66f9c86SAndrey V. Elsukov sfo.flags |= IPFW_CFG_GET_STATIC; 289656707beeSMark Johnston if (g_co.do_dynamic != 0) 28972aa75134SAlexander V. Chernikov sfo.flags |= IPFW_CFG_GET_STATES; 28985d439467SAlexander V. Chernikov if ((sfo.show_counters | sfo.show_time) != 0) 28997e767c79SAlexander V. Chernikov sfo.flags |= IPFW_CFG_GET_COUNTERS; 290056707beeSMark Johnston if (ipfw_get_config(&g_co, &sfo, &cfg, &sz) != 0) 2901563b5ab1SAlexander V. Chernikov err(EX_OSERR, "retrieving config failed"); 29029758b77fSLuigi Rizzo 290356707beeSMark Johnston error = ipfw_show_config(&g_co, &sfo, cfg, sz, ac, av); 2904563b5ab1SAlexander V. Chernikov 2905563b5ab1SAlexander V. Chernikov free(cfg); 2906563b5ab1SAlexander V. Chernikov 2907563b5ab1SAlexander V. Chernikov if (error != EX_OK) 2908563b5ab1SAlexander V. Chernikov exit(error); 29099758b77fSLuigi Rizzo } 29109758b77fSLuigi Rizzo 2911563b5ab1SAlexander V. Chernikov static int 2912563b5ab1SAlexander V. Chernikov ipfw_show_config(struct cmdline_opts *co, struct format_opts *fo, 2913563b5ab1SAlexander V. Chernikov ipfw_cfg_lheader *cfg, size_t sz, int ac, char *av[]) 2914563b5ab1SAlexander V. Chernikov { 29156447bae6SAlexander V. Chernikov caddr_t dynbase; 29166447bae6SAlexander V. Chernikov size_t dynsz; 29176447bae6SAlexander V. Chernikov int rcnt; 2918563b5ab1SAlexander V. Chernikov int exitval = EX_OK; 2919563b5ab1SAlexander V. Chernikov int lac; 2920563b5ab1SAlexander V. Chernikov char **lav; 2921563b5ab1SAlexander V. Chernikov char *endptr; 29226ff33bb6SAlexander V. Chernikov size_t readsz; 2923563b5ab1SAlexander V. Chernikov struct buf_pr bp; 292481cac390SArseny Smalyuk ipfw_obj_ctlv *ctlv; 29257e767c79SAlexander V. Chernikov ipfw_obj_tlv *rbase; 2926563b5ab1SAlexander V. Chernikov 29279758b77fSLuigi Rizzo /* 2928563b5ab1SAlexander V. Chernikov * Handle tablenames TLV first, if any 29299758b77fSLuigi Rizzo */ 2930563b5ab1SAlexander V. Chernikov rbase = NULL; 2931563b5ab1SAlexander V. Chernikov dynbase = NULL; 29326447bae6SAlexander V. Chernikov dynsz = 0; 29336ff33bb6SAlexander V. Chernikov readsz = sizeof(*cfg); 2934d3de6c1dSAlexander V. Chernikov rcnt = 0; 29357e767c79SAlexander V. Chernikov 29367e767c79SAlexander V. Chernikov fo->set_mask = cfg->set_mask; 29379758b77fSLuigi Rizzo 2938563b5ab1SAlexander V. Chernikov ctlv = (ipfw_obj_ctlv *)(cfg + 1); 2939563b5ab1SAlexander V. Chernikov if (ctlv->head.type == IPFW_TLV_TBLNAME_LIST) { 29408963c505SAlexander V. Chernikov object_sort_ctlv(ctlv); 2941563b5ab1SAlexander V. Chernikov fo->tstate = ctlv; 29426ff33bb6SAlexander V. Chernikov readsz += ctlv->head.length; 2943d66f9c86SAndrey V. Elsukov ctlv = (ipfw_obj_ctlv *)((caddr_t)ctlv + ctlv->head.length); 2944563b5ab1SAlexander V. Chernikov } 2945d069a5d4SMaxim Konovalov 2946d66f9c86SAndrey V. Elsukov if (cfg->flags & IPFW_CFG_GET_STATIC) { 2947d66f9c86SAndrey V. Elsukov /* We've requested static rules */ 2948563b5ab1SAlexander V. Chernikov if (ctlv->head.type == IPFW_TLV_RULE_LIST) { 29497e767c79SAlexander V. Chernikov rbase = (ipfw_obj_tlv *)(ctlv + 1); 2950563b5ab1SAlexander V. Chernikov rcnt = ctlv->count; 29516ff33bb6SAlexander V. Chernikov readsz += ctlv->head.length; 2952563b5ab1SAlexander V. Chernikov ctlv = (ipfw_obj_ctlv *)((caddr_t)ctlv + 2953563b5ab1SAlexander V. Chernikov ctlv->head.length); 295445f61351SMaxim Konovalov } 295545f61351SMaxim Konovalov } 295645f61351SMaxim Konovalov 29576ff33bb6SAlexander V. Chernikov if ((cfg->flags & IPFW_CFG_GET_STATES) && (readsz != sz)) { 29586447bae6SAlexander V. Chernikov /* We may have some dynamic states */ 29596ff33bb6SAlexander V. Chernikov dynsz = sz - readsz; 29607e767c79SAlexander V. Chernikov /* Skip empty header */ 29617e767c79SAlexander V. Chernikov if (dynsz != sizeof(ipfw_obj_ctlv)) 29627e767c79SAlexander V. Chernikov dynbase = (caddr_t)ctlv; 29637e767c79SAlexander V. Chernikov else 29647e767c79SAlexander V. Chernikov dynsz = 0; 296545f61351SMaxim Konovalov } 2966563b5ab1SAlexander V. Chernikov 29676447bae6SAlexander V. Chernikov prepare_format_opts(co, fo, rbase, rcnt, dynbase, dynsz); 2968563b5ab1SAlexander V. Chernikov bp_alloc(&bp, 4096); 2969563b5ab1SAlexander V. Chernikov 29709758b77fSLuigi Rizzo /* if no rule numbers were specified, list all rules */ 29719758b77fSLuigi Rizzo if (ac == 0) { 2972563b5ab1SAlexander V. Chernikov fo->first = 0; 2973563b5ab1SAlexander V. Chernikov fo->last = IPFW_DEFAULT_RULE; 2974d66f9c86SAndrey V. Elsukov if (cfg->flags & IPFW_CFG_GET_STATIC) 29756447bae6SAlexander V. Chernikov list_static_range(co, fo, &bp, rbase, rcnt); 2976563b5ab1SAlexander V. Chernikov 29776447bae6SAlexander V. Chernikov if (co->do_dynamic && dynsz > 0) { 2978d66f9c86SAndrey V. Elsukov printf("## Dynamic rules (%d %zu):\n", fo->dcnt, 2979d66f9c86SAndrey V. Elsukov dynsz); 29806447bae6SAlexander V. Chernikov list_dyn_range(co, fo, &bp, dynbase, dynsz); 2981d069a5d4SMaxim Konovalov } 29829758b77fSLuigi Rizzo 2983563b5ab1SAlexander V. Chernikov bp_free(&bp); 2984563b5ab1SAlexander V. Chernikov return (EX_OK); 29859758b77fSLuigi Rizzo } 29869758b77fSLuigi Rizzo 29879758b77fSLuigi Rizzo /* display specific rules requested on command line */ 29889758b77fSLuigi Rizzo for (lac = ac, lav = av; lac != 0; lac--) { 29899758b77fSLuigi Rizzo /* convert command line rule # */ 2990563b5ab1SAlexander V. Chernikov fo->last = fo->first = strtoul(*lav++, &endptr, 10); 299162ff38aeSLuigi Rizzo if (*endptr == '-') 2992563b5ab1SAlexander V. Chernikov fo->last = strtoul(endptr + 1, &endptr, 10); 29939758b77fSLuigi Rizzo if (*endptr) { 29949758b77fSLuigi Rizzo exitval = EX_USAGE; 29959758b77fSLuigi Rizzo warnx("invalid rule number: %s", *(lav - 1)); 29969758b77fSLuigi Rizzo continue; 29979758b77fSLuigi Rizzo } 2998563b5ab1SAlexander V. Chernikov 2999d66f9c86SAndrey V. Elsukov if ((cfg->flags & IPFW_CFG_GET_STATIC) == 0) 3000d66f9c86SAndrey V. Elsukov continue; 3001d66f9c86SAndrey V. Elsukov 30026447bae6SAlexander V. Chernikov if (list_static_range(co, fo, &bp, rbase, rcnt) == 0) { 30039758b77fSLuigi Rizzo /* give precedence to other error(s) */ 30049758b77fSLuigi Rizzo if (exitval == EX_OK) 30059758b77fSLuigi Rizzo exitval = EX_UNAVAILABLE; 30062aa75134SAlexander V. Chernikov if (fo->first == fo->last) 30072aa75134SAlexander V. Chernikov warnx("rule %u does not exist", fo->first); 30082aa75134SAlexander V. Chernikov else 30092aa75134SAlexander V. Chernikov warnx("no rules in range %u-%u", 30102aa75134SAlexander V. Chernikov fo->first, fo->last); 30119758b77fSLuigi Rizzo } 30129758b77fSLuigi Rizzo } 30139758b77fSLuigi Rizzo 30146447bae6SAlexander V. Chernikov if (co->do_dynamic && dynsz > 0) { 30159758b77fSLuigi Rizzo printf("## Dynamic rules:\n"); 30169758b77fSLuigi Rizzo for (lac = ac, lav = av; lac != 0; lac--) { 3017563b5ab1SAlexander V. Chernikov fo->last = fo->first = strtoul(*lav++, &endptr, 10); 301862ff38aeSLuigi Rizzo if (*endptr == '-') 3019563b5ab1SAlexander V. Chernikov fo->last = strtoul(endptr+1, &endptr, 10); 30209758b77fSLuigi Rizzo if (*endptr) 30219758b77fSLuigi Rizzo /* already warned */ 30229758b77fSLuigi Rizzo continue; 30236447bae6SAlexander V. Chernikov list_dyn_range(co, fo, &bp, dynbase, dynsz); 30249758b77fSLuigi Rizzo } 30259758b77fSLuigi Rizzo } 30269758b77fSLuigi Rizzo 3027563b5ab1SAlexander V. Chernikov bp_free(&bp); 3028563b5ab1SAlexander V. Chernikov return (exitval); 3029563b5ab1SAlexander V. Chernikov } 30309758b77fSLuigi Rizzo 30319758b77fSLuigi Rizzo 3032563b5ab1SAlexander V. Chernikov /* 3033563b5ab1SAlexander V. Chernikov * Retrieves current ipfw configuration of given type 3034563b5ab1SAlexander V. Chernikov * and stores its pointer to @pcfg. 3035563b5ab1SAlexander V. Chernikov * 3036563b5ab1SAlexander V. Chernikov * Caller is responsible for freeing @pcfg. 3037563b5ab1SAlexander V. Chernikov * 3038563b5ab1SAlexander V. Chernikov * Returns 0 on success. 3039563b5ab1SAlexander V. Chernikov */ 3040563b5ab1SAlexander V. Chernikov 3041563b5ab1SAlexander V. Chernikov static int 30422aa75134SAlexander V. Chernikov ipfw_get_config(struct cmdline_opts *co, struct format_opts *fo, 3043563b5ab1SAlexander V. Chernikov ipfw_cfg_lheader **pcfg, size_t *psize) 3044563b5ab1SAlexander V. Chernikov { 3045563b5ab1SAlexander V. Chernikov ipfw_cfg_lheader *cfg; 3046563b5ab1SAlexander V. Chernikov size_t sz; 3047b6462881SAlexander V. Chernikov int i; 3048563b5ab1SAlexander V. Chernikov 3049563b5ab1SAlexander V. Chernikov 3050563b5ab1SAlexander V. Chernikov if (co->test_only != 0) { 3051563b5ab1SAlexander V. Chernikov fprintf(stderr, "Testing only, list disabled\n"); 3052563b5ab1SAlexander V. Chernikov return (0); 3053563b5ab1SAlexander V. Chernikov } 3054563b5ab1SAlexander V. Chernikov 3055563b5ab1SAlexander V. Chernikov /* Start with some data size */ 3056563b5ab1SAlexander V. Chernikov sz = 4096; 3057563b5ab1SAlexander V. Chernikov cfg = NULL; 3058563b5ab1SAlexander V. Chernikov 3059720ee730SAlexander V. Chernikov for (i = 0; i < 16; i++) { 3060563b5ab1SAlexander V. Chernikov if (cfg != NULL) 3061563b5ab1SAlexander V. Chernikov free(cfg); 3062563b5ab1SAlexander V. Chernikov if ((cfg = calloc(1, sz)) == NULL) 3063563b5ab1SAlexander V. Chernikov return (ENOMEM); 3064563b5ab1SAlexander V. Chernikov 30652aa75134SAlexander V. Chernikov cfg->flags = fo->flags; 30662aa75134SAlexander V. Chernikov cfg->start_rule = fo->first; 30672aa75134SAlexander V. Chernikov cfg->end_rule = fo->last; 3068563b5ab1SAlexander V. Chernikov 3069b6462881SAlexander V. Chernikov if (do_get3(IP_FW_XGET, &cfg->opheader, &sz) != 0) { 3070b6462881SAlexander V. Chernikov if (errno != ENOMEM) { 3071563b5ab1SAlexander V. Chernikov free(cfg); 3072b6462881SAlexander V. Chernikov return (errno); 3073563b5ab1SAlexander V. Chernikov } 3074563b5ab1SAlexander V. Chernikov 3075563b5ab1SAlexander V. Chernikov /* Buffer size is not enough. Try to increase */ 3076720ee730SAlexander V. Chernikov sz = sz * 2; 3077563b5ab1SAlexander V. Chernikov if (sz < cfg->size) 3078720ee730SAlexander V. Chernikov sz = cfg->size; 3079720ee730SAlexander V. Chernikov continue; 3080563b5ab1SAlexander V. Chernikov } 3081563b5ab1SAlexander V. Chernikov 3082563b5ab1SAlexander V. Chernikov *pcfg = cfg; 3083563b5ab1SAlexander V. Chernikov *psize = sz; 3084563b5ab1SAlexander V. Chernikov return (0); 3085563b5ab1SAlexander V. Chernikov } 3086563b5ab1SAlexander V. Chernikov 3087563b5ab1SAlexander V. Chernikov free(cfg); 3088563b5ab1SAlexander V. Chernikov return (ENOMEM); 30899758b77fSLuigi Rizzo } 30909758b77fSLuigi Rizzo 30919758b77fSLuigi Rizzo static int 30929758b77fSLuigi Rizzo lookup_host (char *host, struct in_addr *ipaddr) 30939758b77fSLuigi Rizzo { 30949758b77fSLuigi Rizzo struct hostent *he; 30959758b77fSLuigi Rizzo 30969758b77fSLuigi Rizzo if (!inet_aton(host, ipaddr)) { 30979758b77fSLuigi Rizzo if ((he = gethostbyname(host)) == NULL) 30989758b77fSLuigi Rizzo return(-1); 30999758b77fSLuigi Rizzo *ipaddr = *(struct in_addr *)he->h_addr_list[0]; 31009758b77fSLuigi Rizzo } 31019758b77fSLuigi Rizzo return(0); 31029758b77fSLuigi Rizzo } 31039758b77fSLuigi Rizzo 31046c2997ffSAlexander V. Chernikov struct tidx { 31056c2997ffSAlexander V. Chernikov ipfw_obj_ntlv *idx; 31066c2997ffSAlexander V. Chernikov uint32_t count; 31076c2997ffSAlexander V. Chernikov uint32_t size; 31086c2997ffSAlexander V. Chernikov uint16_t counter; 310940e5f498SAlexander V. Chernikov uint8_t set; 31106c2997ffSAlexander V. Chernikov }; 31116c2997ffSAlexander V. Chernikov 31122acdf79fSAndrey V. Elsukov int 31132acdf79fSAndrey V. Elsukov ipfw_check_object_name(const char *name) 31142acdf79fSAndrey V. Elsukov { 31152acdf79fSAndrey V. Elsukov int c, i, l; 31162acdf79fSAndrey V. Elsukov 31172acdf79fSAndrey V. Elsukov /* 31182acdf79fSAndrey V. Elsukov * Check that name is null-terminated and contains 31192acdf79fSAndrey V. Elsukov * valid symbols only. Valid mask is: 31202acdf79fSAndrey V. Elsukov * [a-zA-Z0-9\-_\.]{1,63} 31212acdf79fSAndrey V. Elsukov */ 31222acdf79fSAndrey V. Elsukov l = strlen(name); 31232acdf79fSAndrey V. Elsukov if (l == 0 || l >= 64) 31242acdf79fSAndrey V. Elsukov return (EINVAL); 31252acdf79fSAndrey V. Elsukov for (i = 0; i < l; i++) { 31262acdf79fSAndrey V. Elsukov c = name[i]; 31272acdf79fSAndrey V. Elsukov if (isalpha(c) || isdigit(c) || c == '_' || 31282acdf79fSAndrey V. Elsukov c == '-' || c == '.') 31292acdf79fSAndrey V. Elsukov continue; 31302acdf79fSAndrey V. Elsukov return (EINVAL); 31312acdf79fSAndrey V. Elsukov } 31322acdf79fSAndrey V. Elsukov return (0); 31332acdf79fSAndrey V. Elsukov } 31342acdf79fSAndrey V. Elsukov 313556707beeSMark Johnston static const char *default_state_name = "default"; 313656707beeSMark Johnston 3137ed22e564SAndrey V. Elsukov static int 3138ed22e564SAndrey V. Elsukov state_check_name(const char *name) 3139ed22e564SAndrey V. Elsukov { 3140ed22e564SAndrey V. Elsukov 3141ed22e564SAndrey V. Elsukov if (ipfw_check_object_name(name) != 0) 3142ed22e564SAndrey V. Elsukov return (EINVAL); 3143ed22e564SAndrey V. Elsukov if (strcmp(name, "any") == 0) 3144ed22e564SAndrey V. Elsukov return (EINVAL); 3145ed22e564SAndrey V. Elsukov return (0); 3146ed22e564SAndrey V. Elsukov } 3147ed22e564SAndrey V. Elsukov 31482acdf79fSAndrey V. Elsukov static int 31492acdf79fSAndrey V. Elsukov eaction_check_name(const char *name) 31502acdf79fSAndrey V. Elsukov { 31512acdf79fSAndrey V. Elsukov 31522acdf79fSAndrey V. Elsukov if (ipfw_check_object_name(name) != 0) 31532acdf79fSAndrey V. Elsukov return (EINVAL); 31542acdf79fSAndrey V. Elsukov /* Restrict some 'special' names */ 31552acdf79fSAndrey V. Elsukov if (match_token(rule_actions, name) != -1 && 31562acdf79fSAndrey V. Elsukov match_token(rule_action_params, name) != -1) 31572acdf79fSAndrey V. Elsukov return (EINVAL); 31582acdf79fSAndrey V. Elsukov return (0); 31592acdf79fSAndrey V. Elsukov } 31602acdf79fSAndrey V. Elsukov 31616c2997ffSAlexander V. Chernikov static uint16_t 316256707beeSMark Johnston pack_object(struct tidx *tstate, const char *name, int otype) 31636c2997ffSAlexander V. Chernikov { 31646c2997ffSAlexander V. Chernikov ipfw_obj_ntlv *ntlv; 316556707beeSMark Johnston uint32_t i; 31666c2997ffSAlexander V. Chernikov 31676c2997ffSAlexander V. Chernikov for (i = 0; i < tstate->count; i++) { 31686c2997ffSAlexander V. Chernikov if (strcmp(tstate->idx[i].name, name) != 0) 31696c2997ffSAlexander V. Chernikov continue; 317040e5f498SAlexander V. Chernikov if (tstate->idx[i].set != tstate->set) 31716c2997ffSAlexander V. Chernikov continue; 31728963c505SAlexander V. Chernikov if (tstate->idx[i].head.type != otype) 31738963c505SAlexander V. Chernikov continue; 31746c2997ffSAlexander V. Chernikov 31756c2997ffSAlexander V. Chernikov return (tstate->idx[i].idx); 31766c2997ffSAlexander V. Chernikov } 31776c2997ffSAlexander V. Chernikov 31786c2997ffSAlexander V. Chernikov if (tstate->count + 1 > tstate->size) { 31796c2997ffSAlexander V. Chernikov tstate->size += 4; 31806c2997ffSAlexander V. Chernikov tstate->idx = realloc(tstate->idx, tstate->size * 31816c2997ffSAlexander V. Chernikov sizeof(ipfw_obj_ntlv)); 31826c2997ffSAlexander V. Chernikov if (tstate->idx == NULL) 31836c2997ffSAlexander V. Chernikov return (0); 31846c2997ffSAlexander V. Chernikov } 31856c2997ffSAlexander V. Chernikov 31866c2997ffSAlexander V. Chernikov ntlv = &tstate->idx[i]; 31876c2997ffSAlexander V. Chernikov memset(ntlv, 0, sizeof(ipfw_obj_ntlv)); 31886c2997ffSAlexander V. Chernikov strlcpy(ntlv->name, name, sizeof(ntlv->name)); 31898963c505SAlexander V. Chernikov ntlv->head.type = otype; 31906c2997ffSAlexander V. Chernikov ntlv->head.length = sizeof(ipfw_obj_ntlv); 319140e5f498SAlexander V. Chernikov ntlv->set = tstate->set; 31926c2997ffSAlexander V. Chernikov ntlv->idx = ++tstate->counter; 31936c2997ffSAlexander V. Chernikov tstate->count++; 31946c2997ffSAlexander V. Chernikov 31956c2997ffSAlexander V. Chernikov return (ntlv->idx); 31966c2997ffSAlexander V. Chernikov } 31976c2997ffSAlexander V. Chernikov 31988963c505SAlexander V. Chernikov static uint16_t 319956707beeSMark Johnston pack_table(struct tidx *tstate, const char *name) 32008963c505SAlexander V. Chernikov { 32018963c505SAlexander V. Chernikov 32028963c505SAlexander V. Chernikov if (table_check_name(name) != 0) 32038963c505SAlexander V. Chernikov return (0); 32048963c505SAlexander V. Chernikov 32058963c505SAlexander V. Chernikov return (pack_object(tstate, name, IPFW_TLV_TBL_NAME)); 32068963c505SAlexander V. Chernikov } 32078963c505SAlexander V. Chernikov 3208757b5d87SAndrey V. Elsukov void 3209757b5d87SAndrey V. Elsukov fill_table(struct _ipfw_insn *cmd, char *av, uint8_t opcode, 3210757b5d87SAndrey V. Elsukov struct tidx *tstate) 3211914bffb6SAlexander V. Chernikov { 3212914bffb6SAlexander V. Chernikov uint32_t *d = ((ipfw_insn_u32 *)cmd)->d; 3213914bffb6SAlexander V. Chernikov uint16_t uidx; 3214914bffb6SAlexander V. Chernikov char *p; 3215914bffb6SAlexander V. Chernikov 3216914bffb6SAlexander V. Chernikov if ((p = strchr(av + 6, ')')) == NULL) 3217914bffb6SAlexander V. Chernikov errx(EX_DATAERR, "forgotten parenthesis: '%s'", av); 3218914bffb6SAlexander V. Chernikov *p = '\0'; 3219914bffb6SAlexander V. Chernikov p = strchr(av + 6, ','); 3220914bffb6SAlexander V. Chernikov if (p) 3221914bffb6SAlexander V. Chernikov *p++ = '\0'; 3222914bffb6SAlexander V. Chernikov 322340e5f498SAlexander V. Chernikov if ((uidx = pack_table(tstate, av + 6)) == 0) 3224914bffb6SAlexander V. Chernikov errx(EX_DATAERR, "Invalid table name: %s", av + 6); 3225914bffb6SAlexander V. Chernikov 3226914bffb6SAlexander V. Chernikov cmd->opcode = opcode; 3227914bffb6SAlexander V. Chernikov cmd->arg1 = uidx; 3228914bffb6SAlexander V. Chernikov if (p) { 3229914bffb6SAlexander V. Chernikov cmd->len |= F_INSN_SIZE(ipfw_insn_u32); 3230914bffb6SAlexander V. Chernikov d[0] = strtoul(p, NULL, 0); 3231914bffb6SAlexander V. Chernikov } else 3232914bffb6SAlexander V. Chernikov cmd->len |= F_INSN_SIZE(ipfw_insn); 3233914bffb6SAlexander V. Chernikov } 3234914bffb6SAlexander V. Chernikov 3235914bffb6SAlexander V. Chernikov 32369758b77fSLuigi Rizzo /* 32379758b77fSLuigi Rizzo * fills the addr and mask fields in the instruction as appropriate from av. 32389758b77fSLuigi Rizzo * Update length as appropriate. 32399758b77fSLuigi Rizzo * The following formats are allowed: 32409758b77fSLuigi Rizzo * me returns O_IP_*_ME 32419758b77fSLuigi Rizzo * 1.2.3.4 single IP address 32429758b77fSLuigi Rizzo * 1.2.3.4:5.6.7.8 address:mask 32439758b77fSLuigi Rizzo * 1.2.3.4/24 address/mask 32449758b77fSLuigi Rizzo * 1.2.3.4/26{1,6,5,4,23} set of addresses in a subnet 3245571f8c1bSLuigi Rizzo * We can have multiple comma-separated address/mask entries. 32469758b77fSLuigi Rizzo */ 32479758b77fSLuigi Rizzo static void 32486c2997ffSAlexander V. Chernikov fill_ip(ipfw_insn_ip *cmd, char *av, int cblen, struct tidx *tstate) 32499758b77fSLuigi Rizzo { 3250571f8c1bSLuigi Rizzo int len = 0; 3251571f8c1bSLuigi Rizzo uint32_t *d = ((ipfw_insn_u32 *)cmd)->d; 32529758b77fSLuigi Rizzo 32539758b77fSLuigi Rizzo cmd->o.len &= ~F_LEN_MASK; /* zero len */ 32549758b77fSLuigi Rizzo 325501750186SBrooks Davis if (_substrcmp(av, "any") == 0) 32569758b77fSLuigi Rizzo return; 32579758b77fSLuigi Rizzo 325801750186SBrooks Davis if (_substrcmp(av, "me") == 0) { 32599758b77fSLuigi Rizzo cmd->o.len |= F_INSN_SIZE(ipfw_insn); 32609758b77fSLuigi Rizzo return; 32619758b77fSLuigi Rizzo } 32629758b77fSLuigi Rizzo 326301750186SBrooks Davis if (strncmp(av, "table(", 6) == 0) { 3264914bffb6SAlexander V. Chernikov fill_table(&cmd->o, av, O_IP_DST_LOOKUP, tstate); 3265cd8b5ae0SRuslan Ermilov return; 3266cd8b5ae0SRuslan Ermilov } 3267cd8b5ae0SRuslan Ermilov 3268571f8c1bSLuigi Rizzo while (av) { 3269571f8c1bSLuigi Rizzo /* 3270571f8c1bSLuigi Rizzo * After the address we can have '/' or ':' indicating a mask, 3271571f8c1bSLuigi Rizzo * ',' indicating another address follows, '{' indicating a 3272571f8c1bSLuigi Rizzo * set of addresses of unspecified size. 3273571f8c1bSLuigi Rizzo */ 3274c2221c35SMax Laier char *t = NULL, *p = strpbrk(av, "/:,{"); 3275571f8c1bSLuigi Rizzo int masklen; 3276daa9733aSLuigi Rizzo char md, nd = '\0'; 3277571f8c1bSLuigi Rizzo 327856707beeSMark Johnston CHECK_LENGTH(cblen, (int)F_INSN_SIZE(ipfw_insn) + 2 + len); 3279579ed7bdSAlexander V. Chernikov 32809758b77fSLuigi Rizzo if (p) { 32819758b77fSLuigi Rizzo md = *p; 32829758b77fSLuigi Rizzo *p++ = '\0'; 3283c2221c35SMax Laier if ((t = strpbrk(p, ",{")) != NULL) { 3284c2221c35SMax Laier nd = *t; 3285c2221c35SMax Laier *t = '\0'; 3286c2221c35SMax Laier } 3287571f8c1bSLuigi Rizzo } else 3288571f8c1bSLuigi Rizzo md = '\0'; 32899758b77fSLuigi Rizzo 3290571f8c1bSLuigi Rizzo if (lookup_host(av, (struct in_addr *)&d[0]) != 0) 32919758b77fSLuigi Rizzo errx(EX_NOHOST, "hostname ``%s'' unknown", av); 32929758b77fSLuigi Rizzo switch (md) { 32939758b77fSLuigi Rizzo case ':': 3294571f8c1bSLuigi Rizzo if (!inet_aton(p, (struct in_addr *)&d[1])) 32959758b77fSLuigi Rizzo errx(EX_DATAERR, "bad netmask ``%s''", p); 32969758b77fSLuigi Rizzo break; 32979758b77fSLuigi Rizzo case '/': 3298571f8c1bSLuigi Rizzo masklen = atoi(p); 3299571f8c1bSLuigi Rizzo if (masklen == 0) 3300dbe90f04SDimitry Andric d[1] = htonl(0U); /* mask */ 3301571f8c1bSLuigi Rizzo else if (masklen > 32) 33029758b77fSLuigi Rizzo errx(EX_DATAERR, "bad width ``%s''", p); 33039758b77fSLuigi Rizzo else 3304dbe90f04SDimitry Andric d[1] = htonl(~0U << (32 - masklen)); 33059758b77fSLuigi Rizzo break; 3306571f8c1bSLuigi Rizzo case '{': /* no mask, assume /24 and put back the '{' */ 3307dbe90f04SDimitry Andric d[1] = htonl(~0U << (32 - 24)); 3308571f8c1bSLuigi Rizzo *(--p) = md; 3309571f8c1bSLuigi Rizzo break; 3310571f8c1bSLuigi Rizzo 3311571f8c1bSLuigi Rizzo case ',': /* single address plus continuation */ 3312571f8c1bSLuigi Rizzo *(--p) = md; 3313571f8c1bSLuigi Rizzo /* FALLTHROUGH */ 3314571f8c1bSLuigi Rizzo case 0: /* initialization value */ 33159758b77fSLuigi Rizzo default: 3316dbe90f04SDimitry Andric d[1] = htonl(~0U); /* force /32 */ 33179758b77fSLuigi Rizzo break; 33189758b77fSLuigi Rizzo } 3319571f8c1bSLuigi Rizzo d[0] &= d[1]; /* mask base address with mask */ 3320c2221c35SMax Laier if (t) 3321c2221c35SMax Laier *t = nd; 3322571f8c1bSLuigi Rizzo /* find next separator */ 3323571f8c1bSLuigi Rizzo if (p) 3324571f8c1bSLuigi Rizzo p = strpbrk(p, ",{"); 3325571f8c1bSLuigi Rizzo if (p && *p == '{') { 33269758b77fSLuigi Rizzo /* 3327571f8c1bSLuigi Rizzo * We have a set of addresses. They are stored as follows: 33289758b77fSLuigi Rizzo * arg1 is the set size (powers of 2, 2..256) 33299758b77fSLuigi Rizzo * addr is the base address IN HOST FORMAT 3330571f8c1bSLuigi Rizzo * mask.. is an array of arg1 bits (rounded up to 3331571f8c1bSLuigi Rizzo * the next multiple of 32) with bits set 3332571f8c1bSLuigi Rizzo * for each host in the map. 33339758b77fSLuigi Rizzo */ 3334571f8c1bSLuigi Rizzo uint32_t *map = (uint32_t *)&cmd->mask; 33359758b77fSLuigi Rizzo int low, high; 3336f3a126d3SLuigi Rizzo int i = contigmask((uint8_t *)&(d[1]), 32); 33379758b77fSLuigi Rizzo 3338571f8c1bSLuigi Rizzo if (len > 0) 3339571f8c1bSLuigi Rizzo errx(EX_DATAERR, "address set cannot be in a list"); 3340571f8c1bSLuigi Rizzo if (i < 24 || i > 31) 3341571f8c1bSLuigi Rizzo errx(EX_DATAERR, "invalid set with mask %d\n", i); 3342571f8c1bSLuigi Rizzo cmd->o.arg1 = 1<<(32-i); /* map length */ 3343571f8c1bSLuigi Rizzo d[0] = ntohl(d[0]); /* base addr in host format */ 33449758b77fSLuigi Rizzo cmd->o.opcode = O_IP_DST_SET; /* default */ 33459758b77fSLuigi Rizzo cmd->o.len |= F_INSN_SIZE(ipfw_insn_u32) + (cmd->o.arg1+31)/32; 334661360012SLuigi Rizzo for (i = 0; i < (cmd->o.arg1+31)/32 ; i++) 3347571f8c1bSLuigi Rizzo map[i] = 0; /* clear map */ 33489758b77fSLuigi Rizzo 33499758b77fSLuigi Rizzo av = p + 1; 3350571f8c1bSLuigi Rizzo low = d[0] & 0xff; 33519758b77fSLuigi Rizzo high = low + cmd->o.arg1 - 1; 3352571f8c1bSLuigi Rizzo /* 3353571f8c1bSLuigi Rizzo * Here, i stores the previous value when we specify a range 3354571f8c1bSLuigi Rizzo * of addresses within a mask, e.g. 45-63. i = -1 means we 3355571f8c1bSLuigi Rizzo * have no previous value. 3356571f8c1bSLuigi Rizzo */ 33579ef3f16dSLuigi Rizzo i = -1; /* previous value in a range */ 33589758b77fSLuigi Rizzo while (isdigit(*av)) { 33599758b77fSLuigi Rizzo char *s; 3360571f8c1bSLuigi Rizzo int a = strtol(av, &s, 0); 33619758b77fSLuigi Rizzo 3362571f8c1bSLuigi Rizzo if (s == av) { /* no parameter */ 3363571f8c1bSLuigi Rizzo if (*av != '}') 3364571f8c1bSLuigi Rizzo errx(EX_DATAERR, "set not closed\n"); 3365571f8c1bSLuigi Rizzo if (i != -1) 3366571f8c1bSLuigi Rizzo errx(EX_DATAERR, "incomplete range %d-", i); 33679758b77fSLuigi Rizzo break; 33689758b77fSLuigi Rizzo } 3369571f8c1bSLuigi Rizzo if (a < low || a > high) 3370571f8c1bSLuigi Rizzo errx(EX_DATAERR, "addr %d out of range [%d-%d]\n", 3371571f8c1bSLuigi Rizzo a, low, high); 33729758b77fSLuigi Rizzo a -= low; 33739ef3f16dSLuigi Rizzo if (i == -1) /* no previous in range */ 33749ef3f16dSLuigi Rizzo i = a; 33759ef3f16dSLuigi Rizzo else { /* check that range is valid */ 33769ef3f16dSLuigi Rizzo if (i > a) 33779ef3f16dSLuigi Rizzo errx(EX_DATAERR, "invalid range %d-%d", 33789ef3f16dSLuigi Rizzo i+low, a+low); 33799ef3f16dSLuigi Rizzo if (*s == '-') 33809ef3f16dSLuigi Rizzo errx(EX_DATAERR, "double '-' in range"); 33819ef3f16dSLuigi Rizzo } 33829ef3f16dSLuigi Rizzo for (; i <= a; i++) 3383571f8c1bSLuigi Rizzo map[i/32] |= 1<<(i & 31); 33849ef3f16dSLuigi Rizzo i = -1; 33859ef3f16dSLuigi Rizzo if (*s == '-') 33869ef3f16dSLuigi Rizzo i = a; 3387571f8c1bSLuigi Rizzo else if (*s == '}') 33889758b77fSLuigi Rizzo break; 33899758b77fSLuigi Rizzo av = s+1; 33909758b77fSLuigi Rizzo } 33919758b77fSLuigi Rizzo return; 33929758b77fSLuigi Rizzo } 3393571f8c1bSLuigi Rizzo av = p; 3394571f8c1bSLuigi Rizzo if (av) /* then *av must be a ',' */ 3395571f8c1bSLuigi Rizzo av++; 33969758b77fSLuigi Rizzo 3397571f8c1bSLuigi Rizzo /* Check this entry */ 3398571f8c1bSLuigi Rizzo if (d[1] == 0) { /* "any", specified as x.x.x.x/0 */ 3399571f8c1bSLuigi Rizzo /* 3400571f8c1bSLuigi Rizzo * 'any' turns the entire list into a NOP. 3401571f8c1bSLuigi Rizzo * 'not any' never matches, so it is removed from the 3402571f8c1bSLuigi Rizzo * list unless it is the only item, in which case we 3403571f8c1bSLuigi Rizzo * report an error. 3404571f8c1bSLuigi Rizzo */ 3405571f8c1bSLuigi Rizzo if (cmd->o.len & F_NOT) { /* "not any" never matches */ 3406571f8c1bSLuigi Rizzo if (av == NULL && len == 0) /* only this entry */ 34079758b77fSLuigi Rizzo errx(EX_DATAERR, "not any never matches"); 3408571f8c1bSLuigi Rizzo } 3409571f8c1bSLuigi Rizzo /* else do nothing and skip this entry */ 341014533a98SMaxim Konovalov return; 3411571f8c1bSLuigi Rizzo } 3412571f8c1bSLuigi Rizzo /* A single IP can be stored in an optimized format */ 3413cc4d3c30SLuigi Rizzo if (d[1] == (uint32_t)~0 && av == NULL && len == 0) { 34149758b77fSLuigi Rizzo cmd->o.len |= F_INSN_SIZE(ipfw_insn_u32); 3415571f8c1bSLuigi Rizzo return; 3416571f8c1bSLuigi Rizzo } 3417571f8c1bSLuigi Rizzo len += 2; /* two words... */ 3418571f8c1bSLuigi Rizzo d += 2; 3419571f8c1bSLuigi Rizzo } /* end while */ 3420268f526cSJohn Hay if (len + 1 > F_LEN_MASK) 3421268f526cSJohn Hay errx(EX_DATAERR, "address list too long"); 3422571f8c1bSLuigi Rizzo cmd->o.len |= len+1; 34239758b77fSLuigi Rizzo } 34249758b77fSLuigi Rizzo 34259758b77fSLuigi Rizzo 34268195404bSBrooks Davis /* n2mask sets n bits of the mask */ 34274e9c8ae7SLuigi Rizzo void 34288195404bSBrooks Davis n2mask(struct in6_addr *mask, int n) 34298195404bSBrooks Davis { 34308195404bSBrooks Davis static int minimask[9] = 34318195404bSBrooks Davis { 0x00, 0x80, 0xc0, 0xe0, 0xf0, 0xf8, 0xfc, 0xfe, 0xff }; 34328195404bSBrooks Davis u_char *p; 34338195404bSBrooks Davis 34348195404bSBrooks Davis memset(mask, 0, sizeof(struct in6_addr)); 34358195404bSBrooks Davis p = (u_char *) mask; 34368195404bSBrooks Davis for (; n > 0; p++, n -= 8) { 34378195404bSBrooks Davis if (n >= 8) 34388195404bSBrooks Davis *p = 0xff; 34398195404bSBrooks Davis else 34408195404bSBrooks Davis *p = minimask[n]; 34418195404bSBrooks Davis } 34428195404bSBrooks Davis return; 34438195404bSBrooks Davis } 34448195404bSBrooks Davis 34459758b77fSLuigi Rizzo static void 3446914bffb6SAlexander V. Chernikov fill_flags_cmd(ipfw_insn *cmd, enum ipfw_opcodes opcode, 34479758b77fSLuigi Rizzo struct _s_x *flags, char *p) 34489758b77fSLuigi Rizzo { 34490cba2b28SAlexander V. Chernikov char *e; 34500cba2b28SAlexander V. Chernikov uint32_t set = 0, clear = 0; 34519758b77fSLuigi Rizzo 34520cba2b28SAlexander V. Chernikov if (fill_flags(flags, p, &e, &set, &clear) != 0) 34530cba2b28SAlexander V. Chernikov errx(EX_DATAERR, "invalid flag %s", e); 34549758b77fSLuigi Rizzo 34559758b77fSLuigi Rizzo cmd->opcode = opcode; 34569758b77fSLuigi Rizzo cmd->len = (cmd->len & (F_NOT | F_OR)) | 1; 34579758b77fSLuigi Rizzo cmd->arg1 = (set & 0xff) | ( (clear & 0xff) << 8); 34589758b77fSLuigi Rizzo } 34599758b77fSLuigi Rizzo 34609758b77fSLuigi Rizzo 34613c0c8717SLuigi Rizzo void 3462cc4d3c30SLuigi Rizzo ipfw_delete(char *av[]) 34639758b77fSLuigi Rizzo { 3464df5be97cSAndrey V. Elsukov ipfw_range_tlv rt; 3465df5be97cSAndrey V. Elsukov char *sep; 34660b501d96SAlexander V. Chernikov int i, j; 34679758b77fSLuigi Rizzo int exitval = EX_OK; 346843405724SLuigi Rizzo int do_set = 0; 34699758b77fSLuigi Rizzo 3470cc4d3c30SLuigi Rizzo av++; 347104f70834SChristian S.J. Peron NEED1("missing rule specification"); 3472cc4d3c30SLuigi Rizzo if ( *av && _substrcmp(*av, "set") == 0) { 3473d069a5d4SMaxim Konovalov /* Do not allow using the following syntax: 3474d069a5d4SMaxim Konovalov * ipfw set N delete set M 3475d069a5d4SMaxim Konovalov */ 347656707beeSMark Johnston if (g_co.use_set) 3477d069a5d4SMaxim Konovalov errx(EX_DATAERR, "invalid syntax"); 347843405724SLuigi Rizzo do_set = 1; /* delete set */ 3479cc4d3c30SLuigi Rizzo av++; 348099e5e645SLuigi Rizzo } 34819758b77fSLuigi Rizzo 34829758b77fSLuigi Rizzo /* Rule number */ 3483cc4d3c30SLuigi Rizzo while (*av && isdigit(**av)) { 34840b501d96SAlexander V. Chernikov i = strtol(*av, &sep, 10); 34850b501d96SAlexander V. Chernikov j = i; 34860b501d96SAlexander V. Chernikov if (*sep== '-') 34870b501d96SAlexander V. Chernikov j = strtol(sep + 1, NULL, 10); 34880b501d96SAlexander V. Chernikov av++; 348956707beeSMark Johnston if (g_co.do_nat) { 3490db1102f2SAndrey V. Elsukov exitval = ipfw_delete_nat(i); 349156707beeSMark Johnston } else if (g_co.do_pipe) { 349256707beeSMark Johnston exitval = ipfw_delete_pipe(g_co.do_pipe, i); 34939758b77fSLuigi Rizzo } else { 3494df5be97cSAndrey V. Elsukov memset(&rt, 0, sizeof(rt)); 3495a73d728dSAlexander V. Chernikov if (do_set != 0) { 3496a73d728dSAlexander V. Chernikov rt.set = i & 31; 3497a73d728dSAlexander V. Chernikov rt.flags = IPFW_RCFLAG_SET; 3498a73d728dSAlexander V. Chernikov } else { 3499a73d728dSAlexander V. Chernikov rt.start_rule = i & 0xffff; 35000b501d96SAlexander V. Chernikov rt.end_rule = j & 0xffff; 3501a73d728dSAlexander V. Chernikov if (rt.start_rule == 0 && rt.end_rule == 0) 3502a73d728dSAlexander V. Chernikov rt.flags |= IPFW_RCFLAG_ALL; 3503d069a5d4SMaxim Konovalov else 3504a73d728dSAlexander V. Chernikov rt.flags |= IPFW_RCFLAG_RANGE; 350556707beeSMark Johnston if (g_co.use_set != 0) { 350656707beeSMark Johnston rt.set = g_co.use_set - 1; 3507a73d728dSAlexander V. Chernikov rt.flags |= IPFW_RCFLAG_SET; 3508a73d728dSAlexander V. Chernikov } 3509a73d728dSAlexander V. Chernikov } 351056707beeSMark Johnston if (g_co.do_dynamic == 2) 3511d66f9c86SAndrey V. Elsukov rt.flags |= IPFW_RCFLAG_DYNAMIC; 3512a73d728dSAlexander V. Chernikov i = do_range_cmd(IP_FW_XDEL, &rt); 3513a73d728dSAlexander V. Chernikov if (i != 0) { 35149758b77fSLuigi Rizzo exitval = EX_UNAVAILABLE; 351556707beeSMark Johnston if (g_co.do_quiet) 3516e327ad33SAndrey V. Elsukov continue; 3517a73d728dSAlexander V. Chernikov warn("rule %u: setsockopt(IP_FW_XDEL)", 35186ca0dd05SAlexander V. Chernikov rt.start_rule); 3519d66f9c86SAndrey V. Elsukov } else if (rt.new_set == 0 && do_set == 0 && 352056707beeSMark Johnston g_co.do_dynamic != 2) { 35216ca0dd05SAlexander V. Chernikov exitval = EX_UNAVAILABLE; 352256707beeSMark Johnston if (g_co.do_quiet) 3523e327ad33SAndrey V. Elsukov continue; 35246ca0dd05SAlexander V. Chernikov if (rt.start_rule != rt.end_rule) 3525d600ad81SElyes Haouas warnx("no rules in %u-%u range", 35266ca0dd05SAlexander V. Chernikov rt.start_rule, rt.end_rule); 35276ca0dd05SAlexander V. Chernikov else 35286ca0dd05SAlexander V. Chernikov warnx("rule %u not found", 35296ca0dd05SAlexander V. Chernikov rt.start_rule); 35309758b77fSLuigi Rizzo } 35319758b77fSLuigi Rizzo } 35329758b77fSLuigi Rizzo } 353356707beeSMark Johnston if (exitval != EX_OK && g_co.do_force == 0) 35349758b77fSLuigi Rizzo exit(exitval); 35359758b77fSLuigi Rizzo } 35369758b77fSLuigi Rizzo 35379758b77fSLuigi Rizzo 35389758b77fSLuigi Rizzo /* 35399758b77fSLuigi Rizzo * fill the interface structure. We do not check the name as we can 35409758b77fSLuigi Rizzo * create interfaces dynamically, so checking them at insert time 35419758b77fSLuigi Rizzo * makes relatively little sense. 35429bf40edeSBrooks Davis * Interface names containing '*', '?', or '[' are assumed to be shell 35439bf40edeSBrooks Davis * patterns which match interfaces. 35449758b77fSLuigi Rizzo */ 35459758b77fSLuigi Rizzo static void 35466c2997ffSAlexander V. Chernikov fill_iface(ipfw_insn_if *cmd, char *arg, int cblen, struct tidx *tstate) 35479758b77fSLuigi Rizzo { 3548b23d5de9SAlexander V. Chernikov char *p; 35496c2997ffSAlexander V. Chernikov uint16_t uidx; 35506c2997ffSAlexander V. Chernikov 35519758b77fSLuigi Rizzo cmd->name[0] = '\0'; 35529758b77fSLuigi Rizzo cmd->o.len |= F_INSN_SIZE(ipfw_insn_if); 35539758b77fSLuigi Rizzo 3554579ed7bdSAlexander V. Chernikov CHECK_CMDLEN; 3555579ed7bdSAlexander V. Chernikov 35569758b77fSLuigi Rizzo /* Parse the interface or address */ 355701750186SBrooks Davis if (strcmp(arg, "any") == 0) 35589758b77fSLuigi Rizzo cmd->o.len = 0; /* effectively ignore this command */ 3559f8bee51aSAlexander V. Chernikov else if (strncmp(arg, "table(", 6) == 0) { 3560b23d5de9SAlexander V. Chernikov if ((p = strchr(arg + 6, ')')) == NULL) 3561b23d5de9SAlexander V. Chernikov errx(EX_DATAERR, "forgotten parenthesis: '%s'", arg); 3562b23d5de9SAlexander V. Chernikov *p = '\0'; 3563b23d5de9SAlexander V. Chernikov p = strchr(arg + 6, ','); 3564f8bee51aSAlexander V. Chernikov if (p) 3565f8bee51aSAlexander V. Chernikov *p++ = '\0'; 356640e5f498SAlexander V. Chernikov if ((uidx = pack_table(tstate, arg + 6)) == 0) 35676c2997ffSAlexander V. Chernikov errx(EX_DATAERR, "Invalid table name: %s", arg + 6); 35686c2997ffSAlexander V. Chernikov 3569f8bee51aSAlexander V. Chernikov cmd->name[0] = '\1'; /* Special value indicating table */ 35702c452b20SAlexander V. Chernikov cmd->p.kidx = uidx; 3571f8bee51aSAlexander V. Chernikov } else if (!isdigit(*arg)) { 35729bf40edeSBrooks Davis strlcpy(cmd->name, arg, sizeof(cmd->name)); 35739bf40edeSBrooks Davis cmd->p.glob = strpbrk(arg, "*?[") != NULL ? 1 : 0; 35749758b77fSLuigi Rizzo } else if (!inet_aton(arg, &cmd->p.ip)) 35759758b77fSLuigi Rizzo errx(EX_DATAERR, "bad ip address ``%s''", arg); 35769758b77fSLuigi Rizzo } 35779758b77fSLuigi Rizzo 35789758b77fSLuigi Rizzo static void 3579bd1d3456SMaxim Konovalov get_mac_addr_mask(const char *p, uint8_t *addr, uint8_t *mask) 35809758b77fSLuigi Rizzo { 3581cc4d3c30SLuigi Rizzo int i; 3582cc4d3c30SLuigi Rizzo size_t l; 3583bd1d3456SMaxim Konovalov char *ap, *ptr, *optr; 3584bd1d3456SMaxim Konovalov struct ether_addr *mac; 3585bd1d3456SMaxim Konovalov const char *macset = "0123456789abcdefABCDEF:"; 35869758b77fSLuigi Rizzo 3587bd1d3456SMaxim Konovalov if (strcmp(p, "any") == 0) { 3588bd1d3456SMaxim Konovalov for (i = 0; i < ETHER_ADDR_LEN; i++) 35899758b77fSLuigi Rizzo addr[i] = mask[i] = 0; 35909758b77fSLuigi Rizzo return; 3591bd1d3456SMaxim Konovalov } 35929758b77fSLuigi Rizzo 3593bd1d3456SMaxim Konovalov optr = ptr = strdup(p); 3594bd1d3456SMaxim Konovalov if ((ap = strsep(&ptr, "&/")) != NULL && *ap != 0) { 3595bd1d3456SMaxim Konovalov l = strlen(ap); 3596bd1d3456SMaxim Konovalov if (strspn(ap, macset) != l || (mac = ether_aton(ap)) == NULL) 3597bd1d3456SMaxim Konovalov errx(EX_DATAERR, "Incorrect MAC address"); 3598bd1d3456SMaxim Konovalov bcopy(mac, addr, ETHER_ADDR_LEN); 3599bd1d3456SMaxim Konovalov } else 3600bd1d3456SMaxim Konovalov errx(EX_DATAERR, "Incorrect MAC address"); 3601bd1d3456SMaxim Konovalov 3602bd1d3456SMaxim Konovalov if (ptr != NULL) { /* we have mask? */ 3603bd1d3456SMaxim Konovalov if (p[ptr - optr - 1] == '/') { /* mask len */ 3604cc4d3c30SLuigi Rizzo long ml = strtol(ptr, &ap, 10); 3605cc4d3c30SLuigi Rizzo if (*ap != 0 || ml > ETHER_ADDR_LEN * 8 || ml < 0) 3606bd1d3456SMaxim Konovalov errx(EX_DATAERR, "Incorrect mask length"); 3607cc4d3c30SLuigi Rizzo for (i = 0; ml > 0 && i < ETHER_ADDR_LEN; ml -= 8, i++) 3608cc4d3c30SLuigi Rizzo mask[i] = (ml >= 8) ? 0xff: (~0) << (8 - ml); 3609bd1d3456SMaxim Konovalov } else { /* mask */ 3610bd1d3456SMaxim Konovalov l = strlen(ptr); 3611bd1d3456SMaxim Konovalov if (strspn(ptr, macset) != l || 3612bd1d3456SMaxim Konovalov (mac = ether_aton(ptr)) == NULL) 3613bd1d3456SMaxim Konovalov errx(EX_DATAERR, "Incorrect mask"); 3614bd1d3456SMaxim Konovalov bcopy(mac, mask, ETHER_ADDR_LEN); 36159758b77fSLuigi Rizzo } 3616bd1d3456SMaxim Konovalov } else { /* default mask: ff:ff:ff:ff:ff:ff */ 3617bd1d3456SMaxim Konovalov for (i = 0; i < ETHER_ADDR_LEN; i++) 36189758b77fSLuigi Rizzo mask[i] = 0xff; 36199758b77fSLuigi Rizzo } 3620bd1d3456SMaxim Konovalov for (i = 0; i < ETHER_ADDR_LEN; i++) 36219758b77fSLuigi Rizzo addr[i] &= mask[i]; 3622bd1d3456SMaxim Konovalov 3623bd1d3456SMaxim Konovalov free(optr); 36249758b77fSLuigi Rizzo } 36259758b77fSLuigi Rizzo 36269758b77fSLuigi Rizzo /* 36279758b77fSLuigi Rizzo * helper function, updates the pointer to cmd with the length 36289758b77fSLuigi Rizzo * of the current command, and also cleans up the first word of 36299758b77fSLuigi Rizzo * the new command in case it has been clobbered before. 36309758b77fSLuigi Rizzo */ 36319758b77fSLuigi Rizzo static ipfw_insn * 3632579ed7bdSAlexander V. Chernikov next_cmd(ipfw_insn *cmd, int *len) 36339758b77fSLuigi Rizzo { 3634579ed7bdSAlexander V. Chernikov *len -= F_LEN(cmd); 3635579ed7bdSAlexander V. Chernikov CHECK_LENGTH(*len, 0); 36369758b77fSLuigi Rizzo cmd += F_LEN(cmd); 36379758b77fSLuigi Rizzo bzero(cmd, sizeof(*cmd)); 36389758b77fSLuigi Rizzo return cmd; 36399758b77fSLuigi Rizzo } 36409758b77fSLuigi Rizzo 36419758b77fSLuigi Rizzo /* 364262ff38aeSLuigi Rizzo * Takes arguments and copies them into a comment 364362ff38aeSLuigi Rizzo */ 364462ff38aeSLuigi Rizzo static void 3645579ed7bdSAlexander V. Chernikov fill_comment(ipfw_insn *cmd, char **av, int cblen) 364662ff38aeSLuigi Rizzo { 364762ff38aeSLuigi Rizzo int i, l; 364862ff38aeSLuigi Rizzo char *p = (char *)(cmd + 1); 364962ff38aeSLuigi Rizzo 365062ff38aeSLuigi Rizzo cmd->opcode = O_NOP; 365162ff38aeSLuigi Rizzo cmd->len = (cmd->len & (F_NOT | F_OR)); 365262ff38aeSLuigi Rizzo 365362ff38aeSLuigi Rizzo /* Compute length of comment string. */ 3654cc4d3c30SLuigi Rizzo for (i = 0, l = 0; av[i] != NULL; i++) 365562ff38aeSLuigi Rizzo l += strlen(av[i]) + 1; 365662ff38aeSLuigi Rizzo if (l == 0) 365762ff38aeSLuigi Rizzo return; 365862ff38aeSLuigi Rizzo if (l > 84) 365962ff38aeSLuigi Rizzo errx(EX_DATAERR, 366062ff38aeSLuigi Rizzo "comment too long (max 80 chars)"); 366162ff38aeSLuigi Rizzo l = 1 + (l+3)/4; 366262ff38aeSLuigi Rizzo cmd->len = (cmd->len & (F_NOT | F_OR)) | l; 3663579ed7bdSAlexander V. Chernikov CHECK_CMDLEN; 3664579ed7bdSAlexander V. Chernikov 3665cc4d3c30SLuigi Rizzo for (i = 0; av[i] != NULL; i++) { 366662ff38aeSLuigi Rizzo strcpy(p, av[i]); 366762ff38aeSLuigi Rizzo p += strlen(av[i]); 366862ff38aeSLuigi Rizzo *p++ = ' '; 366962ff38aeSLuigi Rizzo } 367062ff38aeSLuigi Rizzo *(--p) = '\0'; 367162ff38aeSLuigi Rizzo } 367262ff38aeSLuigi Rizzo 367362ff38aeSLuigi Rizzo /* 36749758b77fSLuigi Rizzo * A function to fill simple commands of size 1. 36759758b77fSLuigi Rizzo * Existing flags are preserved. 36769758b77fSLuigi Rizzo */ 36779758b77fSLuigi Rizzo static void 3678571f8c1bSLuigi Rizzo fill_cmd(ipfw_insn *cmd, enum ipfw_opcodes opcode, int flags, uint16_t arg) 36799758b77fSLuigi Rizzo { 36809758b77fSLuigi Rizzo cmd->opcode = opcode; 36819758b77fSLuigi Rizzo cmd->len = ((cmd->len | flags) & (F_NOT | F_OR)) | 1; 36829758b77fSLuigi Rizzo cmd->arg1 = arg; 36839758b77fSLuigi Rizzo } 36849758b77fSLuigi Rizzo 36859758b77fSLuigi Rizzo /* 36869758b77fSLuigi Rizzo * Fetch and add the MAC address and type, with masks. This generates one or 36879758b77fSLuigi Rizzo * two microinstructions, and returns the pointer to the last one. 36889758b77fSLuigi Rizzo */ 36899758b77fSLuigi Rizzo static ipfw_insn * 3690579ed7bdSAlexander V. Chernikov add_mac(ipfw_insn *cmd, char *av[], int cblen) 36919758b77fSLuigi Rizzo { 3692e706181bSLuigi Rizzo ipfw_insn_mac *mac; 36939758b77fSLuigi Rizzo 3694cc4d3c30SLuigi Rizzo if ( ( av[0] == NULL ) || ( av[1] == NULL ) ) 36955a155b40SLuigi Rizzo errx(EX_DATAERR, "MAC dst src"); 36969758b77fSLuigi Rizzo 36979758b77fSLuigi Rizzo cmd->opcode = O_MACADDR2; 36989758b77fSLuigi Rizzo cmd->len = (cmd->len & (F_NOT | F_OR)) | F_INSN_SIZE(ipfw_insn_mac); 3699579ed7bdSAlexander V. Chernikov CHECK_CMDLEN; 37009758b77fSLuigi Rizzo 37019758b77fSLuigi Rizzo mac = (ipfw_insn_mac *)cmd; 37029758b77fSLuigi Rizzo get_mac_addr_mask(av[0], mac->addr, mac->mask); /* dst */ 3703bd1d3456SMaxim Konovalov get_mac_addr_mask(av[1], &(mac->addr[ETHER_ADDR_LEN]), 3704bd1d3456SMaxim Konovalov &(mac->mask[ETHER_ADDR_LEN])); /* src */ 3705e706181bSLuigi Rizzo return cmd; 37069758b77fSLuigi Rizzo } 37079758b77fSLuigi Rizzo 3708e706181bSLuigi Rizzo static ipfw_insn * 3709579ed7bdSAlexander V. Chernikov add_mactype(ipfw_insn *cmd, char *av, int cblen) 3710e706181bSLuigi Rizzo { 3711cc4d3c30SLuigi Rizzo if (!av) 3712e706181bSLuigi Rizzo errx(EX_DATAERR, "missing MAC type"); 3713e706181bSLuigi Rizzo if (strcmp(av, "any") != 0) { /* we have a non-null type */ 3714579ed7bdSAlexander V. Chernikov fill_newports((ipfw_insn_u16 *)cmd, av, IPPROTO_ETHERTYPE, 3715579ed7bdSAlexander V. Chernikov cblen); 3716e706181bSLuigi Rizzo cmd->opcode = O_MAC_TYPE; 37179758b77fSLuigi Rizzo return cmd; 3718e706181bSLuigi Rizzo } else 3719e706181bSLuigi Rizzo return NULL; 3720e706181bSLuigi Rizzo } 3721e706181bSLuigi Rizzo 3722e706181bSLuigi Rizzo static ipfw_insn * 372336c263ccSHajimu UMEMOTO add_proto0(ipfw_insn *cmd, char *av, u_char *protop) 3724e706181bSLuigi Rizzo { 3725e706181bSLuigi Rizzo struct protoent *pe; 372636c263ccSHajimu UMEMOTO char *ep; 372736c263ccSHajimu UMEMOTO int proto; 37288195404bSBrooks Davis 3729c6ec0226SHajimu UMEMOTO proto = strtol(av, &ep, 10); 3730c6ec0226SHajimu UMEMOTO if (*ep != '\0' || proto <= 0) { 373136c263ccSHajimu UMEMOTO if ((pe = getprotobyname(av)) == NULL) 373236c263ccSHajimu UMEMOTO return NULL; 373336c263ccSHajimu UMEMOTO proto = pe->p_proto; 373436c263ccSHajimu UMEMOTO } 373536c263ccSHajimu UMEMOTO 373636c263ccSHajimu UMEMOTO fill_cmd(cmd, O_PROTO, 0, proto); 373736c263ccSHajimu UMEMOTO *protop = proto; 373836c263ccSHajimu UMEMOTO return cmd; 373936c263ccSHajimu UMEMOTO } 374036c263ccSHajimu UMEMOTO 374136c263ccSHajimu UMEMOTO static ipfw_insn * 374236c263ccSHajimu UMEMOTO add_proto(ipfw_insn *cmd, char *av, u_char *protop) 374336c263ccSHajimu UMEMOTO { 374436c263ccSHajimu UMEMOTO u_char proto = IPPROTO_IP; 3745e706181bSLuigi Rizzo 3746c6ec0226SHajimu UMEMOTO if (_substrcmp(av, "all") == 0 || strcmp(av, "ip") == 0) 374757cd6d26SMax Laier ; /* do not set O_IP4 nor O_IP6 */ 374836c263ccSHajimu UMEMOTO else if (strcmp(av, "ip4") == 0) 374936c263ccSHajimu UMEMOTO /* explicit "just IPv4" rule */ 375036c263ccSHajimu UMEMOTO fill_cmd(cmd, O_IP4, 0, 0); 375136c263ccSHajimu UMEMOTO else if (strcmp(av, "ip6") == 0) { 375236c263ccSHajimu UMEMOTO /* explicit "just IPv6" rule */ 375336c263ccSHajimu UMEMOTO proto = IPPROTO_IPV6; 375436c263ccSHajimu UMEMOTO fill_cmd(cmd, O_IP6, 0, 0); 375536c263ccSHajimu UMEMOTO } else 375636c263ccSHajimu UMEMOTO return add_proto0(cmd, av, protop); 375736c263ccSHajimu UMEMOTO 375836c263ccSHajimu UMEMOTO *protop = proto; 375936c263ccSHajimu UMEMOTO return cmd; 376036c263ccSHajimu UMEMOTO } 376136c263ccSHajimu UMEMOTO 376236c263ccSHajimu UMEMOTO static ipfw_insn * 376336c263ccSHajimu UMEMOTO add_proto_compat(ipfw_insn *cmd, char *av, u_char *protop) 376436c263ccSHajimu UMEMOTO { 376536c263ccSHajimu UMEMOTO u_char proto = IPPROTO_IP; 376636c263ccSHajimu UMEMOTO 376736c263ccSHajimu UMEMOTO if (_substrcmp(av, "all") == 0 || strcmp(av, "ip") == 0) 376836c263ccSHajimu UMEMOTO ; /* do not set O_IP4 nor O_IP6 */ 376957cd6d26SMax Laier else if (strcmp(av, "ipv4") == 0 || strcmp(av, "ip4") == 0) 377057cd6d26SMax Laier /* explicit "just IPv4" rule */ 377157cd6d26SMax Laier fill_cmd(cmd, O_IP4, 0, 0); 377257cd6d26SMax Laier else if (strcmp(av, "ipv6") == 0 || strcmp(av, "ip6") == 0) { 377357cd6d26SMax Laier /* explicit "just IPv6" rule */ 377436c263ccSHajimu UMEMOTO proto = IPPROTO_IPV6; 377557cd6d26SMax Laier fill_cmd(cmd, O_IP6, 0, 0); 377636c263ccSHajimu UMEMOTO } else 377736c263ccSHajimu UMEMOTO return add_proto0(cmd, av, protop); 37788195404bSBrooks Davis 377936c263ccSHajimu UMEMOTO *protop = proto; 3780e706181bSLuigi Rizzo return cmd; 3781e706181bSLuigi Rizzo } 3782e706181bSLuigi Rizzo 3783e706181bSLuigi Rizzo static ipfw_insn * 37846c2997ffSAlexander V. Chernikov add_srcip(ipfw_insn *cmd, char *av, int cblen, struct tidx *tstate) 3785e706181bSLuigi Rizzo { 37866c2997ffSAlexander V. Chernikov fill_ip((ipfw_insn_ip *)cmd, av, cblen, tstate); 3787e706181bSLuigi Rizzo if (cmd->opcode == O_IP_DST_SET) /* set */ 3788e706181bSLuigi Rizzo cmd->opcode = O_IP_SRC_SET; 3789cd8b5ae0SRuslan Ermilov else if (cmd->opcode == O_IP_DST_LOOKUP) /* table */ 3790cd8b5ae0SRuslan Ermilov cmd->opcode = O_IP_SRC_LOOKUP; 3791e706181bSLuigi Rizzo else if (F_LEN(cmd) == F_INSN_SIZE(ipfw_insn)) /* me */ 3792e706181bSLuigi Rizzo cmd->opcode = O_IP_SRC_ME; 3793e706181bSLuigi Rizzo else if (F_LEN(cmd) == F_INSN_SIZE(ipfw_insn_u32)) /* one IP */ 3794e706181bSLuigi Rizzo cmd->opcode = O_IP_SRC; 3795571f8c1bSLuigi Rizzo else /* addr/mask */ 3796e706181bSLuigi Rizzo cmd->opcode = O_IP_SRC_MASK; 3797e706181bSLuigi Rizzo return cmd; 3798e706181bSLuigi Rizzo } 3799e706181bSLuigi Rizzo 3800e706181bSLuigi Rizzo static ipfw_insn * 38016c2997ffSAlexander V. Chernikov add_dstip(ipfw_insn *cmd, char *av, int cblen, struct tidx *tstate) 3802e706181bSLuigi Rizzo { 38036c2997ffSAlexander V. Chernikov fill_ip((ipfw_insn_ip *)cmd, av, cblen, tstate); 3804e706181bSLuigi Rizzo if (cmd->opcode == O_IP_DST_SET) /* set */ 3805e706181bSLuigi Rizzo ; 3806cd8b5ae0SRuslan Ermilov else if (cmd->opcode == O_IP_DST_LOOKUP) /* table */ 3807cd8b5ae0SRuslan Ermilov ; 3808e706181bSLuigi Rizzo else if (F_LEN(cmd) == F_INSN_SIZE(ipfw_insn)) /* me */ 3809e706181bSLuigi Rizzo cmd->opcode = O_IP_DST_ME; 3810e706181bSLuigi Rizzo else if (F_LEN(cmd) == F_INSN_SIZE(ipfw_insn_u32)) /* one IP */ 3811e706181bSLuigi Rizzo cmd->opcode = O_IP_DST; 3812571f8c1bSLuigi Rizzo else /* addr/mask */ 3813e706181bSLuigi Rizzo cmd->opcode = O_IP_DST_MASK; 3814e706181bSLuigi Rizzo return cmd; 3815e706181bSLuigi Rizzo } 3816e706181bSLuigi Rizzo 381781cac390SArseny Smalyuk static ipfw_insn * 381881cac390SArseny Smalyuk add_srcmac(ipfw_insn *cmd, char *av, struct tidx *tstate) 381981cac390SArseny Smalyuk { 382081cac390SArseny Smalyuk 382181cac390SArseny Smalyuk if (strncmp(av, "table(", 6) == 0) 382281cac390SArseny Smalyuk fill_table(cmd, av, O_MAC_SRC_LOOKUP, tstate); 382381cac390SArseny Smalyuk else 382481cac390SArseny Smalyuk errx(EX_DATAERR, "only mac table lookup is supported %s", av); 382581cac390SArseny Smalyuk return cmd; 382681cac390SArseny Smalyuk } 382781cac390SArseny Smalyuk 382881cac390SArseny Smalyuk static ipfw_insn * 382981cac390SArseny Smalyuk add_dstmac(ipfw_insn *cmd, char *av, struct tidx *tstate) 383081cac390SArseny Smalyuk { 383181cac390SArseny Smalyuk 383281cac390SArseny Smalyuk if (strncmp(av, "table(", 6) == 0) 383381cac390SArseny Smalyuk fill_table(cmd, av, O_MAC_DST_LOOKUP, tstate); 383481cac390SArseny Smalyuk else 383581cac390SArseny Smalyuk errx(EX_DATAERR, "only mac table lookup is supported %s", av); 383681cac390SArseny Smalyuk return cmd; 383781cac390SArseny Smalyuk } 383881cac390SArseny Smalyuk 383981cac390SArseny Smalyuk 38409bb47e70SAlexander V. Chernikov static struct _s_x f_reserved_keywords[] = { 38419bb47e70SAlexander V. Chernikov { "altq", TOK_OR }, 38429bb47e70SAlexander V. Chernikov { "//", TOK_OR }, 38439bb47e70SAlexander V. Chernikov { "diverted", TOK_OR }, 38449bb47e70SAlexander V. Chernikov { "dst-port", TOK_OR }, 38459bb47e70SAlexander V. Chernikov { "src-port", TOK_OR }, 38469bb47e70SAlexander V. Chernikov { "established", TOK_OR }, 38479bb47e70SAlexander V. Chernikov { "keep-state", TOK_OR }, 38489bb47e70SAlexander V. Chernikov { "frag", TOK_OR }, 38499bb47e70SAlexander V. Chernikov { "icmptypes", TOK_OR }, 38509bb47e70SAlexander V. Chernikov { "in", TOK_OR }, 38519bb47e70SAlexander V. Chernikov { "out", TOK_OR }, 38529bb47e70SAlexander V. Chernikov { "ip6", TOK_OR }, 38539bb47e70SAlexander V. Chernikov { "any", TOK_OR }, 38549bb47e70SAlexander V. Chernikov { "to", TOK_OR }, 38559bb47e70SAlexander V. Chernikov { "via", TOK_OR }, 38569bb47e70SAlexander V. Chernikov { "{", TOK_OR }, 38579bb47e70SAlexander V. Chernikov { NULL, 0 } /* terminator */ 38589bb47e70SAlexander V. Chernikov }; 38599bb47e70SAlexander V. Chernikov 3860e706181bSLuigi Rizzo static ipfw_insn * 3861579ed7bdSAlexander V. Chernikov add_ports(ipfw_insn *cmd, char *av, u_char proto, int opcode, int cblen) 3862e706181bSLuigi Rizzo { 38639bb47e70SAlexander V. Chernikov 38649bb47e70SAlexander V. Chernikov if (match_token(f_reserved_keywords, av) != -1) 38659bb47e70SAlexander V. Chernikov return (NULL); 38669bb47e70SAlexander V. Chernikov 38679bb47e70SAlexander V. Chernikov if (fill_newports((ipfw_insn_u16 *)cmd, av, proto, cblen)) { 3868e706181bSLuigi Rizzo /* XXX todo: check that we have a protocol with ports */ 3869e706181bSLuigi Rizzo cmd->opcode = opcode; 3870e706181bSLuigi Rizzo return cmd; 3871e706181bSLuigi Rizzo } 3872e706181bSLuigi Rizzo return NULL; 38739758b77fSLuigi Rizzo } 38749758b77fSLuigi Rizzo 38758195404bSBrooks Davis static ipfw_insn * 38766c2997ffSAlexander V. Chernikov add_src(ipfw_insn *cmd, char *av, u_char proto, int cblen, struct tidx *tstate) 38778195404bSBrooks Davis { 38788195404bSBrooks Davis struct in6_addr a; 387921278efeSAlexander V. Chernikov char *host, *ch, buf[INET6_ADDRSTRLEN]; 3880926bbf90SMax Laier ipfw_insn *ret = NULL; 388156707beeSMark Johnston size_t len; 3882926bbf90SMax Laier 388321278efeSAlexander V. Chernikov /* Copy first address in set if needed */ 388421278efeSAlexander V. Chernikov if ((ch = strpbrk(av, "/,")) != NULL) { 388521278efeSAlexander V. Chernikov len = ch - av; 388621278efeSAlexander V. Chernikov strlcpy(buf, av, sizeof(buf)); 388721278efeSAlexander V. Chernikov if (len < sizeof(buf)) 388821278efeSAlexander V. Chernikov buf[len] = '\0'; 388921278efeSAlexander V. Chernikov host = buf; 389021278efeSAlexander V. Chernikov } else 389121278efeSAlexander V. Chernikov host = av; 38928195404bSBrooks Davis 38938195404bSBrooks Davis if (proto == IPPROTO_IPV6 || strcmp(av, "me6") == 0 || 3894cc4d3c30SLuigi Rizzo inet_pton(AF_INET6, host, &a) == 1) 3895757b5d87SAndrey V. Elsukov ret = add_srcip6(cmd, av, cblen, tstate); 3896e3bf606cSAlexander V. Chernikov /* XXX: should check for IPv4, not !IPv6 */ 3897e3bf606cSAlexander V. Chernikov if (ret == NULL && (proto == IPPROTO_IP || strcmp(av, "me") == 0 || 3898e3bf606cSAlexander V. Chernikov inet_pton(AF_INET6, host, &a) != 1)) 38996c2997ffSAlexander V. Chernikov ret = add_srcip(cmd, av, cblen, tstate); 3900e3bf606cSAlexander V. Chernikov if (ret == NULL && strcmp(av, "any") != 0) 3901926bbf90SMax Laier ret = cmd; 39028195404bSBrooks Davis 3903926bbf90SMax Laier return ret; 39048195404bSBrooks Davis } 39058195404bSBrooks Davis 39068195404bSBrooks Davis static ipfw_insn * 39076c2997ffSAlexander V. Chernikov add_dst(ipfw_insn *cmd, char *av, u_char proto, int cblen, struct tidx *tstate) 39088195404bSBrooks Davis { 39098195404bSBrooks Davis struct in6_addr a; 391021278efeSAlexander V. Chernikov char *host, *ch, buf[INET6_ADDRSTRLEN]; 3911926bbf90SMax Laier ipfw_insn *ret = NULL; 391256707beeSMark Johnston size_t len; 3913926bbf90SMax Laier 391421278efeSAlexander V. Chernikov /* Copy first address in set if needed */ 391521278efeSAlexander V. Chernikov if ((ch = strpbrk(av, "/,")) != NULL) { 391621278efeSAlexander V. Chernikov len = ch - av; 391721278efeSAlexander V. Chernikov strlcpy(buf, av, sizeof(buf)); 391821278efeSAlexander V. Chernikov if (len < sizeof(buf)) 391921278efeSAlexander V. Chernikov buf[len] = '\0'; 392021278efeSAlexander V. Chernikov host = buf; 392121278efeSAlexander V. Chernikov } else 392221278efeSAlexander V. Chernikov host = av; 39238195404bSBrooks Davis 39248195404bSBrooks Davis if (proto == IPPROTO_IPV6 || strcmp(av, "me6") == 0 || 3925cc4d3c30SLuigi Rizzo inet_pton(AF_INET6, host, &a) == 1) 3926757b5d87SAndrey V. Elsukov ret = add_dstip6(cmd, av, cblen, tstate); 3927e3bf606cSAlexander V. Chernikov /* XXX: should check for IPv4, not !IPv6 */ 3928e3bf606cSAlexander V. Chernikov if (ret == NULL && (proto == IPPROTO_IP || strcmp(av, "me") == 0 || 3929e3bf606cSAlexander V. Chernikov inet_pton(AF_INET6, host, &a) != 1)) 39306c2997ffSAlexander V. Chernikov ret = add_dstip(cmd, av, cblen, tstate); 3931e3bf606cSAlexander V. Chernikov if (ret == NULL && strcmp(av, "any") != 0) 3932926bbf90SMax Laier ret = cmd; 39338195404bSBrooks Davis 3934926bbf90SMax Laier return ret; 39358195404bSBrooks Davis } 39368195404bSBrooks Davis 39376a9cfebaSAlexander V. Chernikov static inline int 39386a9cfebaSAlexander V. Chernikov arg_or_targ_relaxed(const char *arg, const char *action) 39396a9cfebaSAlexander V. Chernikov { 39406a9cfebaSAlexander V. Chernikov uint32_t arg1 = (uint32_t)(-1); 39416a9cfebaSAlexander V. Chernikov 39426a9cfebaSAlexander V. Chernikov if (arg == NULL) 39436a9cfebaSAlexander V. Chernikov errx(EX_USAGE, "missing argument for %s", action); 39446a9cfebaSAlexander V. Chernikov if (isdigit(arg[0])) { 39456a9cfebaSAlexander V. Chernikov arg1 = strtoul(arg, NULL, 10); 39466a9cfebaSAlexander V. Chernikov if (arg1 <= 0 || arg1 >= IP_FW_TABLEARG) 39476a9cfebaSAlexander V. Chernikov errx(EX_DATAERR, "illegal argument %s(%u) for %s", 39486a9cfebaSAlexander V. Chernikov arg, arg1, action); 39496a9cfebaSAlexander V. Chernikov } else if (_substrcmp(arg, "tablearg") == 0) 39506a9cfebaSAlexander V. Chernikov arg1 = IP_FW_TARG; 39516a9cfebaSAlexander V. Chernikov return (arg1); 39526a9cfebaSAlexander V. Chernikov } 39536a9cfebaSAlexander V. Chernikov 39546a9cfebaSAlexander V. Chernikov static inline uint16_t 39556a9cfebaSAlexander V. Chernikov arg_or_targ(const char *arg, const char *action) 39566a9cfebaSAlexander V. Chernikov { 39576a9cfebaSAlexander V. Chernikov uint32_t arg1 = arg_or_targ_relaxed(arg, action); 39586a9cfebaSAlexander V. Chernikov 39596a9cfebaSAlexander V. Chernikov if (arg1 == (uint32_t)(-1)) 39606a9cfebaSAlexander V. Chernikov errx(EX_DATAERR, "illegal argument %s(%u) for %s", 39616a9cfebaSAlexander V. Chernikov arg, arg1, action); 39626a9cfebaSAlexander V. Chernikov return (arg1); 39636a9cfebaSAlexander V. Chernikov } 39646a9cfebaSAlexander V. Chernikov 39652b5dd8b8SAlexander V. Chernikov static uint16_t 39662b5dd8b8SAlexander V. Chernikov get_divert_port(const char *arg, const char *action) 39676a9cfebaSAlexander V. Chernikov { 39686a9cfebaSAlexander V. Chernikov uint32_t arg1 = arg_or_targ_relaxed(arg, action); 39696a9cfebaSAlexander V. Chernikov 39702b5dd8b8SAlexander V. Chernikov if (arg1 != (uint32_t)(-1)) 39712b5dd8b8SAlexander V. Chernikov return (arg1); 39726a9cfebaSAlexander V. Chernikov 39736a9cfebaSAlexander V. Chernikov struct servent *s; 39746a9cfebaSAlexander V. Chernikov setservent(1); 39756a9cfebaSAlexander V. Chernikov s = getservbyname(arg, "divert"); 39762b5dd8b8SAlexander V. Chernikov if (s == NULL) 39776a9cfebaSAlexander V. Chernikov errx(EX_DATAERR, "illegal divert/tee port"); 39782b5dd8b8SAlexander V. Chernikov return (ntohs(s->s_port)); 39796a9cfebaSAlexander V. Chernikov } 39806a9cfebaSAlexander V. Chernikov 39819758b77fSLuigi Rizzo /* 39829758b77fSLuigi Rizzo * Parse arguments and assemble the microinstructions which make up a rule. 39839758b77fSLuigi Rizzo * Rules are added into the 'rulebuf' and then copied in the correct order 39849758b77fSLuigi Rizzo * into the actual rule. 39859758b77fSLuigi Rizzo * 3986974dfe30SBrian Feldman * The syntax for a rule starts with the action, followed by 3987974dfe30SBrian Feldman * optional action parameters, and the various match patterns. 39889d5abbddSJens Schweikhardt * In the assembled microcode, the first opcode must be an O_PROBE_STATE 39899758b77fSLuigi Rizzo * (generated if the rule includes a keep-state option), then the 3990974dfe30SBrian Feldman * various match patterns, log/altq actions, and the actual action. 39919758b77fSLuigi Rizzo * 39929758b77fSLuigi Rizzo */ 399356707beeSMark Johnston static void 39946c2997ffSAlexander V. Chernikov compile_rule(char *av[], uint32_t *rbuf, int *rbufsize, struct tidx *tstate) 39959758b77fSLuigi Rizzo { 39969758b77fSLuigi Rizzo /* 39979758b77fSLuigi Rizzo * rules are added into the 'rulebuf' and then copied in 39989758b77fSLuigi Rizzo * the correct order into the actual rule. 39999758b77fSLuigi Rizzo * Some things that need to go out of order (prob, action etc.) 40009758b77fSLuigi Rizzo * go into actbuf[]. 40019758b77fSLuigi Rizzo */ 40026c2997ffSAlexander V. Chernikov static uint32_t actbuf[255], cmdbuf[255]; 4003579ed7bdSAlexander V. Chernikov int rblen, ablen, cblen; 40049758b77fSLuigi Rizzo 400562ff38aeSLuigi Rizzo ipfw_insn *src, *dst, *cmd, *action, *prev=NULL; 4006e706181bSLuigi Rizzo ipfw_insn *first_cmd; /* first match pattern */ 40079758b77fSLuigi Rizzo 40087e767c79SAlexander V. Chernikov struct ip_fw_rule *rule; 40099758b77fSLuigi Rizzo 40109758b77fSLuigi Rizzo /* 40119758b77fSLuigi Rizzo * various flags used to record that we entered some fields. 40129758b77fSLuigi Rizzo */ 4013f7c4fdeeSAndrey V. Elsukov ipfw_insn *have_state = NULL; /* any state-related option */ 4014f7c4fdeeSAndrey V. Elsukov int have_rstate = 0; 40156a7d5cb6SOleg Bulyzhin ipfw_insn *have_log = NULL, *have_altq = NULL, *have_tag = NULL; 4016f7c4fdeeSAndrey V. Elsukov ipfw_insn *have_skipcmd = NULL; 40179ec4f2e1SMaxim Konovalov size_t len; 40189758b77fSLuigi Rizzo 40199758b77fSLuigi Rizzo int i; 40209758b77fSLuigi Rizzo 40219758b77fSLuigi Rizzo int open_par = 0; /* open parenthesis ( */ 40229758b77fSLuigi Rizzo 40239758b77fSLuigi Rizzo /* proto is here because it is used to fetch ports */ 40249758b77fSLuigi Rizzo u_char proto = IPPROTO_IP; /* default protocol */ 40259758b77fSLuigi Rizzo 402612b5dc6aSLuigi Rizzo double match_prob = 1; /* match probability, default is always match */ 402712b5dc6aSLuigi Rizzo 40289758b77fSLuigi Rizzo bzero(actbuf, sizeof(actbuf)); /* actions go here */ 40299758b77fSLuigi Rizzo bzero(cmdbuf, sizeof(cmdbuf)); 40306c2997ffSAlexander V. Chernikov bzero(rbuf, *rbufsize); 40319758b77fSLuigi Rizzo 40327e767c79SAlexander V. Chernikov rule = (struct ip_fw_rule *)rbuf; 40339758b77fSLuigi Rizzo cmd = (ipfw_insn *)cmdbuf; 40349758b77fSLuigi Rizzo action = (ipfw_insn *)actbuf; 40359758b77fSLuigi Rizzo 40366c2997ffSAlexander V. Chernikov rblen = *rbufsize / sizeof(uint32_t); 40377e767c79SAlexander V. Chernikov rblen -= sizeof(struct ip_fw_rule) / sizeof(uint32_t); 4038*c3c81617SElyes Haouas ablen = nitems(actbuf); 4039*c3c81617SElyes Haouas cblen = nitems(cmdbuf); 4040579ed7bdSAlexander V. Chernikov cblen -= F_INSN_SIZE(ipfw_insn_u32) + 1; 4041579ed7bdSAlexander V. Chernikov 4042579ed7bdSAlexander V. Chernikov #define CHECK_RBUFLEN(len) { CHECK_LENGTH(rblen, len); rblen -= len; } 4043579ed7bdSAlexander V. Chernikov #define CHECK_ACTLEN CHECK_LENGTH(ablen, action->len) 4044579ed7bdSAlexander V. Chernikov 4045cc4d3c30SLuigi Rizzo av++; 40469758b77fSLuigi Rizzo 40479758b77fSLuigi Rizzo /* [rule N] -- Rule number optional */ 4048cc4d3c30SLuigi Rizzo if (av[0] && isdigit(**av)) { 40499758b77fSLuigi Rizzo rule->rulenum = atoi(*av); 40509758b77fSLuigi Rizzo av++; 40519758b77fSLuigi Rizzo } 40529758b77fSLuigi Rizzo 40533004afcaSLuigi Rizzo /* [set N] -- set number (0..RESVD_SET), optional */ 4054c72c2330SLuigi Rizzo if (av[0] && av[1] && _substrcmp(*av, "set") == 0) { 405543405724SLuigi Rizzo int set = strtoul(av[1], NULL, 10); 40563004afcaSLuigi Rizzo if (set < 0 || set > RESVD_SET) 405743405724SLuigi Rizzo errx(EX_DATAERR, "illegal set %s", av[1]); 405843405724SLuigi Rizzo rule->set = set; 405940e5f498SAlexander V. Chernikov tstate->set = set; 4060cc4d3c30SLuigi Rizzo av += 2; 406143405724SLuigi Rizzo } 406243405724SLuigi Rizzo 40639758b77fSLuigi Rizzo /* [prob D] -- match probability, optional */ 4064cc4d3c30SLuigi Rizzo if (av[0] && av[1] && _substrcmp(*av, "prob") == 0) { 406512b5dc6aSLuigi Rizzo match_prob = strtod(av[1], NULL); 40669758b77fSLuigi Rizzo 406712b5dc6aSLuigi Rizzo if (match_prob <= 0 || match_prob > 1) 40689758b77fSLuigi Rizzo errx(EX_DATAERR, "illegal match prob. %s", av[1]); 4069cc4d3c30SLuigi Rizzo av += 2; 40709758b77fSLuigi Rizzo } 40719758b77fSLuigi Rizzo 40729758b77fSLuigi Rizzo /* action -- mandatory */ 40739758b77fSLuigi Rizzo NEED1("missing action"); 40749758b77fSLuigi Rizzo i = match_token(rule_actions, *av); 4075cc4d3c30SLuigi Rizzo av++; 40769758b77fSLuigi Rizzo action->len = 1; /* default */ 4077579ed7bdSAlexander V. Chernikov CHECK_ACTLEN; 40789758b77fSLuigi Rizzo switch(i) { 40799758b77fSLuigi Rizzo case TOK_CHECKSTATE: 408052bc23abSLuigi Rizzo have_state = action; 40819758b77fSLuigi Rizzo action->opcode = O_CHECK_STATE; 40826ed14738SAndrey V. Elsukov if (*av == NULL || 40836ed14738SAndrey V. Elsukov match_token(rule_options, *av) == TOK_COMMENT) { 4084ed22e564SAndrey V. Elsukov action->arg1 = pack_object(tstate, 4085ed22e564SAndrey V. Elsukov default_state_name, IPFW_TLV_STATE_NAME); 4086ed22e564SAndrey V. Elsukov break; 4087ed22e564SAndrey V. Elsukov } 40886ed14738SAndrey V. Elsukov if (*av[0] == ':') { 40896ed14738SAndrey V. Elsukov if (strcmp(*av + 1, "any") == 0) 4090ed22e564SAndrey V. Elsukov action->arg1 = 0; 40916ed14738SAndrey V. Elsukov else if (state_check_name(*av + 1) == 0) 40926ed14738SAndrey V. Elsukov action->arg1 = pack_object(tstate, *av + 1, 4093ed22e564SAndrey V. Elsukov IPFW_TLV_STATE_NAME); 4094ed22e564SAndrey V. Elsukov else 40956ed14738SAndrey V. Elsukov errx(EX_DATAERR, "Invalid state name %s", 40966ed14738SAndrey V. Elsukov *av); 4097ed22e564SAndrey V. Elsukov av++; 40989758b77fSLuigi Rizzo break; 40996ed14738SAndrey V. Elsukov } 41006ed14738SAndrey V. Elsukov errx(EX_DATAERR, "Invalid state name %s", *av); 41016ed14738SAndrey V. Elsukov break; 41029758b77fSLuigi Rizzo 4103665c8a2eSMichael Tuexen case TOK_ABORT: 4104665c8a2eSMichael Tuexen action->opcode = O_REJECT; 4105665c8a2eSMichael Tuexen action->arg1 = ICMP_REJECT_ABORT; 4106665c8a2eSMichael Tuexen break; 4107665c8a2eSMichael Tuexen 4108665c8a2eSMichael Tuexen case TOK_ABORT6: 4109665c8a2eSMichael Tuexen action->opcode = O_UNREACH6; 4110665c8a2eSMichael Tuexen action->arg1 = ICMP6_UNREACH_ABORT; 4111665c8a2eSMichael Tuexen break; 4112665c8a2eSMichael Tuexen 41139758b77fSLuigi Rizzo case TOK_ACCEPT: 41149758b77fSLuigi Rizzo action->opcode = O_ACCEPT; 41159758b77fSLuigi Rizzo break; 41169758b77fSLuigi Rizzo 41179758b77fSLuigi Rizzo case TOK_DENY: 41189758b77fSLuigi Rizzo action->opcode = O_DENY; 41195e43aef8SLuigi Rizzo action->arg1 = 0; 41205e43aef8SLuigi Rizzo break; 41215e43aef8SLuigi Rizzo 41225e43aef8SLuigi Rizzo case TOK_REJECT: 41235e43aef8SLuigi Rizzo action->opcode = O_REJECT; 41245e43aef8SLuigi Rizzo action->arg1 = ICMP_UNREACH_HOST; 41255e43aef8SLuigi Rizzo break; 41265e43aef8SLuigi Rizzo 41275e43aef8SLuigi Rizzo case TOK_RESET: 41285e43aef8SLuigi Rizzo action->opcode = O_REJECT; 41295e43aef8SLuigi Rizzo action->arg1 = ICMP_REJECT_RST; 41305e43aef8SLuigi Rizzo break; 41315e43aef8SLuigi Rizzo 41329066356bSBjoern A. Zeeb case TOK_RESET6: 41339066356bSBjoern A. Zeeb action->opcode = O_UNREACH6; 41349066356bSBjoern A. Zeeb action->arg1 = ICMP6_UNREACH_RST; 41359066356bSBjoern A. Zeeb break; 41369066356bSBjoern A. Zeeb 41375e43aef8SLuigi Rizzo case TOK_UNREACH: 41385e43aef8SLuigi Rizzo action->opcode = O_REJECT; 41395e43aef8SLuigi Rizzo NEED1("missing reject code"); 41402b5dd8b8SAlexander V. Chernikov action->arg1 = get_reject_code(*av); 4141cc4d3c30SLuigi Rizzo av++; 414205b9737fSGleb Smirnoff if (action->arg1 == ICMP_UNREACH_NEEDFRAG && isdigit(**av)) { 414305b9737fSGleb Smirnoff uint16_t mtu; 414405b9737fSGleb Smirnoff 414505b9737fSGleb Smirnoff mtu = strtoul(*av, NULL, 10); 414605b9737fSGleb Smirnoff if (mtu < 68 || mtu >= IP_MAXPACKET) 414705b9737fSGleb Smirnoff errx(EX_DATAERR, "illegal argument for %s", 414805b9737fSGleb Smirnoff *(av - 1)); 414905b9737fSGleb Smirnoff action->len = F_INSN_SIZE(ipfw_insn_u16); 415005b9737fSGleb Smirnoff ((ipfw_insn_u16 *)action)->ports[0] = mtu; 415105b9737fSGleb Smirnoff av++; 415205b9737fSGleb Smirnoff } 41539758b77fSLuigi Rizzo break; 41549758b77fSLuigi Rizzo 41559066356bSBjoern A. Zeeb case TOK_UNREACH6: 41569066356bSBjoern A. Zeeb action->opcode = O_UNREACH6; 41579066356bSBjoern A. Zeeb NEED1("missing unreach code"); 41582b5dd8b8SAlexander V. Chernikov action->arg1 = get_unreach6_code(*av); 4159cc4d3c30SLuigi Rizzo av++; 41609066356bSBjoern A. Zeeb break; 41619066356bSBjoern A. Zeeb 41629758b77fSLuigi Rizzo case TOK_COUNT: 41639758b77fSLuigi Rizzo action->opcode = O_COUNT; 41649758b77fSLuigi Rizzo break; 41659758b77fSLuigi Rizzo 4166f94a7fc0SPaolo Pisati case TOK_NAT: 4167f94a7fc0SPaolo Pisati action->opcode = O_NAT; 4168f94a7fc0SPaolo Pisati action->len = F_INSN_SIZE(ipfw_insn_nat); 4169579ed7bdSAlexander V. Chernikov CHECK_ACTLEN; 41706a9cfebaSAlexander V. Chernikov if (*av != NULL && _substrcmp(*av, "global") == 0) 4171d6eb9b02SAndrey V. Elsukov action->arg1 = IP_FW_NAT44_GLOBAL; 41726a9cfebaSAlexander V. Chernikov else 41736a9cfebaSAlexander V. Chernikov action->arg1 = arg_or_targ(av[0], *(av - 1)); 41741875bbfeSAndrey V. Elsukov av++; 41751875bbfeSAndrey V. Elsukov break; 41769758b77fSLuigi Rizzo case TOK_QUEUE: 41779758b77fSLuigi Rizzo action->opcode = O_QUEUE; 41786a9cfebaSAlexander V. Chernikov action->arg1 = arg_or_targ(av[0], *(av - 1)); 41796a9cfebaSAlexander V. Chernikov av++; 41806a9cfebaSAlexander V. Chernikov break; 418140b1ae9eSGleb Smirnoff case TOK_PIPE: 41829758b77fSLuigi Rizzo action->opcode = O_PIPE; 41836a9cfebaSAlexander V. Chernikov action->arg1 = arg_or_targ(av[0], *(av - 1)); 41846a9cfebaSAlexander V. Chernikov av++; 41856a9cfebaSAlexander V. Chernikov break; 418640b1ae9eSGleb Smirnoff case TOK_SKIPTO: 41879758b77fSLuigi Rizzo action->opcode = O_SKIPTO; 41886a9cfebaSAlexander V. Chernikov action->arg1 = arg_or_targ(av[0], *(av - 1)); 41896a9cfebaSAlexander V. Chernikov av++; 41906a9cfebaSAlexander V. Chernikov break; 419140b1ae9eSGleb Smirnoff case TOK_NETGRAPH: 419240b1ae9eSGleb Smirnoff action->opcode = O_NETGRAPH; 41936a9cfebaSAlexander V. Chernikov action->arg1 = arg_or_targ(av[0], *(av - 1)); 41946a9cfebaSAlexander V. Chernikov av++; 41956a9cfebaSAlexander V. Chernikov break; 419640b1ae9eSGleb Smirnoff case TOK_NGTEE: 419740b1ae9eSGleb Smirnoff action->opcode = O_NGTEE; 41986a9cfebaSAlexander V. Chernikov action->arg1 = arg_or_targ(av[0], *(av - 1)); 41996a9cfebaSAlexander V. Chernikov av++; 42006a9cfebaSAlexander V. Chernikov break; 42019758b77fSLuigi Rizzo case TOK_DIVERT: 420240b1ae9eSGleb Smirnoff action->opcode = O_DIVERT; 42032b5dd8b8SAlexander V. Chernikov action->arg1 = get_divert_port(av[0], *(av - 1)); 42046a9cfebaSAlexander V. Chernikov av++; 42056a9cfebaSAlexander V. Chernikov break; 42069758b77fSLuigi Rizzo case TOK_TEE: 420740b1ae9eSGleb Smirnoff action->opcode = O_TEE; 42082b5dd8b8SAlexander V. Chernikov action->arg1 = get_divert_port(av[0], *(av - 1)); 42096a9cfebaSAlexander V. Chernikov av++; 42106a9cfebaSAlexander V. Chernikov break; 42119527ec6eSAndrey V. Elsukov case TOK_CALL: 42129527ec6eSAndrey V. Elsukov action->opcode = O_CALLRETURN; 42136a9cfebaSAlexander V. Chernikov action->arg1 = arg_or_targ(av[0], *(av - 1)); 4214cc4d3c30SLuigi Rizzo av++; 4215670742a1SGleb Smirnoff break; 4216670742a1SGleb Smirnoff 42179758b77fSLuigi Rizzo case TOK_FORWARD: { 42188a006adbSBjoern A. Zeeb /* 42198a006adbSBjoern A. Zeeb * Locate the address-port separator (':' or ','). 42208a006adbSBjoern A. Zeeb * Could be one of the following: 42218a006adbSBjoern A. Zeeb * hostname:port 42228a006adbSBjoern A. Zeeb * IPv4 a.b.c.d,port 42238a006adbSBjoern A. Zeeb * IPv4 a.b.c.d:port 42248a006adbSBjoern A. Zeeb * IPv6 w:x:y::z,port 4225a3349dd9SMark Johnston * IPv6 [w:x:y::z]:port 42268a006adbSBjoern A. Zeeb */ 42278a006adbSBjoern A. Zeeb struct sockaddr_storage result; 42288a006adbSBjoern A. Zeeb struct addrinfo *res; 42299758b77fSLuigi Rizzo char *s, *end; 42308a006adbSBjoern A. Zeeb int family; 4231268a20a0SAdrian Chadd u_short port_number = 0; 42329758b77fSLuigi Rizzo 42339758b77fSLuigi Rizzo NEED1("missing forward address[:port]"); 42349758b77fSLuigi Rizzo 4235f6f29787SLutz Donnerhacke if (strncmp(*av, "tablearg", 8) == 0 && 4236f6f29787SLutz Donnerhacke ((*av)[8] == '\0' || (*av)[8] == ',' || (*av)[8] == ':')) 42376cb13813SLutz Donnerhacke memcpy(++(*av), "0.0.0.0", 7); 42386cb13813SLutz Donnerhacke 4239a3349dd9SMark Johnston /* 4240a3349dd9SMark Johnston * Are we an bracket-enclosed IPv6 address? 4241a3349dd9SMark Johnston */ 4242a3349dd9SMark Johnston if (strchr(*av, '[')) 4243a3349dd9SMark Johnston (*av)++; 4244a3349dd9SMark Johnston 42458a006adbSBjoern A. Zeeb /* 42468a006adbSBjoern A. Zeeb * locate the address-port separator (':' or ',') 42478a006adbSBjoern A. Zeeb */ 42488a006adbSBjoern A. Zeeb s = strchr(*av, ','); 42498a006adbSBjoern A. Zeeb if (s == NULL) { 4250a3349dd9SMark Johnston s = strchr(*av, ']'); 4251a3349dd9SMark Johnston /* Prevent erroneous parsing on brackets. */ 4252a3349dd9SMark Johnston if (s != NULL) 4253a3349dd9SMark Johnston *(s++) = '\0'; 4254a3349dd9SMark Johnston else 4255a3349dd9SMark Johnston s = *av; 4256a3349dd9SMark Johnston 42578a006adbSBjoern A. Zeeb /* Distinguish between IPv4:port and IPv6 cases. */ 4258a3349dd9SMark Johnston s = strchr(s, ':'); 42598a006adbSBjoern A. Zeeb if (s && strchr(s+1, ':')) 42608a006adbSBjoern A. Zeeb s = NULL; /* no port */ 42618a006adbSBjoern A. Zeeb } 42628a006adbSBjoern A. Zeeb 42638a006adbSBjoern A. Zeeb if (s != NULL) { 42648a006adbSBjoern A. Zeeb /* Terminate host portion and set s to start of port. */ 42658a006adbSBjoern A. Zeeb *(s++) = '\0'; 42668a006adbSBjoern A. Zeeb i = strtoport(s, &end, 0 /* base */, 0 /* proto */); 42678a006adbSBjoern A. Zeeb if (s == end) 42688a006adbSBjoern A. Zeeb errx(EX_DATAERR, 42698a006adbSBjoern A. Zeeb "illegal forwarding port ``%s''", s); 42708a006adbSBjoern A. Zeeb port_number = (u_short)i; 42718a006adbSBjoern A. Zeeb } 42728a006adbSBjoern A. Zeeb 42738a006adbSBjoern A. Zeeb /* 42748a006adbSBjoern A. Zeeb * Resolve the host name or address to a family and a 42754b85a12fSUlrich Spörlein * network representation of the address. 42768a006adbSBjoern A. Zeeb */ 42778a006adbSBjoern A. Zeeb if (getaddrinfo(*av, NULL, NULL, &res)) 42788a006adbSBjoern A. Zeeb errx(EX_DATAERR, NULL); 42798a006adbSBjoern A. Zeeb /* Just use the first host in the answer. */ 42808a006adbSBjoern A. Zeeb family = res->ai_family; 42818a006adbSBjoern A. Zeeb memcpy(&result, res->ai_addr, res->ai_addrlen); 42828a006adbSBjoern A. Zeeb freeaddrinfo(res); 42838a006adbSBjoern A. Zeeb 42848a006adbSBjoern A. Zeeb if (family == PF_INET) { 42858a006adbSBjoern A. Zeeb ipfw_insn_sa *p = (ipfw_insn_sa *)action; 42868a006adbSBjoern A. Zeeb 42879758b77fSLuigi Rizzo action->opcode = O_FORWARD_IP; 42889758b77fSLuigi Rizzo action->len = F_INSN_SIZE(ipfw_insn_sa); 4289579ed7bdSAlexander V. Chernikov CHECK_ACTLEN; 42909758b77fSLuigi Rizzo 4291a52e28c7SLuigi Rizzo /* 4292a52e28c7SLuigi Rizzo * In the kernel we assume AF_INET and use only 42936e47ca1bSLuigi Rizzo * sin_port and sin_addr. Remember to set sin_len as 42946e47ca1bSLuigi Rizzo * the routing code seems to use it too. 4295a52e28c7SLuigi Rizzo */ 42966e47ca1bSLuigi Rizzo p->sa.sin_len = sizeof(struct sockaddr_in); 42978a006adbSBjoern A. Zeeb p->sa.sin_family = AF_INET; 42988a006adbSBjoern A. Zeeb p->sa.sin_port = port_number; 42998a006adbSBjoern A. Zeeb p->sa.sin_addr.s_addr = 43008a006adbSBjoern A. Zeeb ((struct sockaddr_in *)&result)->sin_addr.s_addr; 43018a006adbSBjoern A. Zeeb } else if (family == PF_INET6) { 43028a006adbSBjoern A. Zeeb ipfw_insn_sa6 *p = (ipfw_insn_sa6 *)action; 43038a006adbSBjoern A. Zeeb 43048a006adbSBjoern A. Zeeb action->opcode = O_FORWARD_IP6; 43058a006adbSBjoern A. Zeeb action->len = F_INSN_SIZE(ipfw_insn_sa6); 4306579ed7bdSAlexander V. Chernikov CHECK_ACTLEN; 43078a006adbSBjoern A. Zeeb 43088a006adbSBjoern A. Zeeb p->sa.sin6_len = sizeof(struct sockaddr_in6); 43098a006adbSBjoern A. Zeeb p->sa.sin6_family = AF_INET6; 43108a006adbSBjoern A. Zeeb p->sa.sin6_port = port_number; 43118a006adbSBjoern A. Zeeb p->sa.sin6_flowinfo = 0; 4312dc9fa19bSAndrey V. Elsukov p->sa.sin6_scope_id = 4313dc9fa19bSAndrey V. Elsukov ((struct sockaddr_in6 *)&result)->sin6_scope_id; 43148a006adbSBjoern A. Zeeb bcopy(&((struct sockaddr_in6*)&result)->sin6_addr, 43158a006adbSBjoern A. Zeeb &p->sa.sin6_addr, sizeof(p->sa.sin6_addr)); 43168a006adbSBjoern A. Zeeb } else { 43178a006adbSBjoern A. Zeeb errx(EX_DATAERR, "Invalid address family in forward action"); 43189758b77fSLuigi Rizzo } 4319cc4d3c30SLuigi Rizzo av++; 43209758b77fSLuigi Rizzo break; 4321c487be96SJulian Elischer } 432262ff38aeSLuigi Rizzo case TOK_COMMENT: 432362ff38aeSLuigi Rizzo /* pretend it is a 'count' rule followed by the comment */ 432462ff38aeSLuigi Rizzo action->opcode = O_COUNT; 4325cc4d3c30SLuigi Rizzo av--; /* go back... */ 432662ff38aeSLuigi Rizzo break; 432762ff38aeSLuigi Rizzo 43288b07e49aSJulian Elischer case TOK_SETFIB: 43298b07e49aSJulian Elischer { 43308b07e49aSJulian Elischer int numfibs; 433105b0fdacSJulian Elischer size_t intsize = sizeof(int); 43328b07e49aSJulian Elischer 43338b07e49aSJulian Elischer action->opcode = O_SETFIB; 43348b07e49aSJulian Elischer NEED1("missing fib number"); 433541b60837SAndrey V. Elsukov if (_substrcmp(*av, "tablearg") == 0) { 43361940fa77SAlexander V. Chernikov action->arg1 = IP_FW_TARG; 433741b60837SAndrey V. Elsukov } else { 43388b07e49aSJulian Elischer action->arg1 = strtoul(*av, NULL, 10); 433941b60837SAndrey V. Elsukov if (sysctlbyname("net.fibs", &numfibs, &intsize, 434041b60837SAndrey V. Elsukov NULL, 0) == -1) 4341809ad817SGordon Bergling errx(EX_DATAERR, "fibs not supported.\n"); 43428b07e49aSJulian Elischer if (action->arg1 >= numfibs) /* Temporary */ 43438b07e49aSJulian Elischer errx(EX_DATAERR, "fib too large.\n"); 43441940fa77SAlexander V. Chernikov /* Add high-order bit to fib to make room for tablearg*/ 43451940fa77SAlexander V. Chernikov action->arg1 |= 0x8000; 434641b60837SAndrey V. Elsukov } 4347cc4d3c30SLuigi Rizzo av++; 43488b07e49aSJulian Elischer break; 43498b07e49aSJulian Elischer } 43508b07e49aSJulian Elischer 4351ae01d73cSAlexander V. Chernikov case TOK_SETDSCP: 4352ae01d73cSAlexander V. Chernikov { 4353ae01d73cSAlexander V. Chernikov int code; 4354ae01d73cSAlexander V. Chernikov 4355ae01d73cSAlexander V. Chernikov action->opcode = O_SETDSCP; 4356ae01d73cSAlexander V. Chernikov NEED1("missing DSCP code"); 4357ae01d73cSAlexander V. Chernikov if (_substrcmp(*av, "tablearg") == 0) { 43581940fa77SAlexander V. Chernikov action->arg1 = IP_FW_TARG; 435978724b52SAndrey V. Elsukov } else { 436078724b52SAndrey V. Elsukov if (isalpha(*av[0])) { 4361ae01d73cSAlexander V. Chernikov if ((code = match_token(f_ipdscp, *av)) == -1) 4362ae01d73cSAlexander V. Chernikov errx(EX_DATAERR, "Unknown DSCP code"); 4363ae01d73cSAlexander V. Chernikov action->arg1 = code; 4364ae01d73cSAlexander V. Chernikov } else 4365ae01d73cSAlexander V. Chernikov action->arg1 = strtoul(*av, NULL, 10); 436678724b52SAndrey V. Elsukov /* 436778724b52SAndrey V. Elsukov * Add high-order bit to DSCP to make room 436878724b52SAndrey V. Elsukov * for tablearg 436978724b52SAndrey V. Elsukov */ 43701940fa77SAlexander V. Chernikov action->arg1 |= 0x8000; 437178724b52SAndrey V. Elsukov } 4372ae01d73cSAlexander V. Chernikov av++; 4373ae01d73cSAlexander V. Chernikov break; 4374ae01d73cSAlexander V. Chernikov } 4375ae01d73cSAlexander V. Chernikov 4376eb2e4119SPaolo Pisati case TOK_REASS: 4377eb2e4119SPaolo Pisati action->opcode = O_REASS; 4378eb2e4119SPaolo Pisati break; 4379eb2e4119SPaolo Pisati 43809527ec6eSAndrey V. Elsukov case TOK_RETURN: 43819527ec6eSAndrey V. Elsukov fill_cmd(action, O_CALLRETURN, F_NOT, 0); 43829527ec6eSAndrey V. Elsukov break; 43839527ec6eSAndrey V. Elsukov 4384fc727ad6SBoris Lytochkin case TOK_SETMARK: { 4385fc727ad6SBoris Lytochkin action->opcode = O_SETMARK; 4386fc727ad6SBoris Lytochkin action->len = F_INSN_SIZE(ipfw_insn_u32); 4387fc727ad6SBoris Lytochkin NEED1("missing mark"); 4388fc727ad6SBoris Lytochkin if (strcmp(*av, "tablearg") == 0) { 4389fc727ad6SBoris Lytochkin action->arg1 = IP_FW_TARG; 4390fc727ad6SBoris Lytochkin } else { 4391fc727ad6SBoris Lytochkin ((ipfw_insn_u32 *)action)->d[0] = 4392fc727ad6SBoris Lytochkin strtoul(*av, NULL, 0); 4393fc727ad6SBoris Lytochkin /* This is not a tablearg */ 4394fc727ad6SBoris Lytochkin action->arg1 |= 0x8000; 4395fc727ad6SBoris Lytochkin } 4396fc727ad6SBoris Lytochkin av++; 4397fc727ad6SBoris Lytochkin CHECK_CMDLEN; 4398fc727ad6SBoris Lytochkin break; 4399fc727ad6SBoris Lytochkin } 4400fc727ad6SBoris Lytochkin 4401aac74aeaSAndrey V. Elsukov case TOK_TCPSETMSS: { 4402aac74aeaSAndrey V. Elsukov u_long mss; 4403aac74aeaSAndrey V. Elsukov uint16_t idx; 4404aac74aeaSAndrey V. Elsukov 4405aac74aeaSAndrey V. Elsukov idx = pack_object(tstate, "tcp-setmss", IPFW_TLV_EACTION); 4406aac74aeaSAndrey V. Elsukov if (idx == 0) 4407aac74aeaSAndrey V. Elsukov errx(EX_DATAERR, "pack_object failed"); 4408aac74aeaSAndrey V. Elsukov fill_cmd(action, O_EXTERNAL_ACTION, 0, idx); 4409aac74aeaSAndrey V. Elsukov NEED1("Missing MSS value"); 4410aac74aeaSAndrey V. Elsukov action = next_cmd(action, &ablen); 4411aac74aeaSAndrey V. Elsukov action->len = 1; 4412aac74aeaSAndrey V. Elsukov CHECK_ACTLEN; 4413aac74aeaSAndrey V. Elsukov mss = strtoul(*av, NULL, 10); 4414aac74aeaSAndrey V. Elsukov if (mss == 0 || mss > UINT16_MAX) 4415aac74aeaSAndrey V. Elsukov errx(EX_USAGE, "invalid MSS value %s", *av); 4416aac74aeaSAndrey V. Elsukov fill_cmd(action, O_EXTERNAL_DATA, 0, (uint16_t)mss); 4417aac74aeaSAndrey V. Elsukov av++; 4418aac74aeaSAndrey V. Elsukov break; 4419aac74aeaSAndrey V. Elsukov } 4420aac74aeaSAndrey V. Elsukov 44219758b77fSLuigi Rizzo default: 44222acdf79fSAndrey V. Elsukov av--; 44232acdf79fSAndrey V. Elsukov if (match_token(rule_eactions, *av) == -1) 44242acdf79fSAndrey V. Elsukov errx(EX_DATAERR, "invalid action %s\n", *av); 44252acdf79fSAndrey V. Elsukov /* 44262acdf79fSAndrey V. Elsukov * External actions support. 44272acdf79fSAndrey V. Elsukov * XXX: we support only syntax with instance name. 44282acdf79fSAndrey V. Elsukov * For known external actions (from rule_eactions list) 44292acdf79fSAndrey V. Elsukov * we can handle syntax directly. But with `eaction' 44302acdf79fSAndrey V. Elsukov * keyword we can use only `eaction <name> <instance>' 44312acdf79fSAndrey V. Elsukov * syntax. 44322acdf79fSAndrey V. Elsukov */ 44332acdf79fSAndrey V. Elsukov case TOK_EACTION: { 44342acdf79fSAndrey V. Elsukov uint16_t idx; 44352acdf79fSAndrey V. Elsukov 44362acdf79fSAndrey V. Elsukov NEED1("Missing eaction name"); 44372acdf79fSAndrey V. Elsukov if (eaction_check_name(*av) != 0) 44382acdf79fSAndrey V. Elsukov errx(EX_DATAERR, "Invalid eaction name %s", *av); 44392acdf79fSAndrey V. Elsukov idx = pack_object(tstate, *av, IPFW_TLV_EACTION); 44402acdf79fSAndrey V. Elsukov if (idx == 0) 44412acdf79fSAndrey V. Elsukov errx(EX_DATAERR, "pack_object failed"); 44422acdf79fSAndrey V. Elsukov fill_cmd(action, O_EXTERNAL_ACTION, 0, idx); 44432acdf79fSAndrey V. Elsukov av++; 44442acdf79fSAndrey V. Elsukov NEED1("Missing eaction instance name"); 44452acdf79fSAndrey V. Elsukov action = next_cmd(action, &ablen); 44462acdf79fSAndrey V. Elsukov action->len = 1; 44472acdf79fSAndrey V. Elsukov CHECK_ACTLEN; 44482acdf79fSAndrey V. Elsukov if (eaction_check_name(*av) != 0) 44492acdf79fSAndrey V. Elsukov errx(EX_DATAERR, "Invalid eaction instance name %s", 44502acdf79fSAndrey V. Elsukov *av); 44512acdf79fSAndrey V. Elsukov /* 44522acdf79fSAndrey V. Elsukov * External action instance object has TLV type depended 44532acdf79fSAndrey V. Elsukov * from the external action name object index. Since we 44542acdf79fSAndrey V. Elsukov * currently don't know this index, use zero as TLV type. 44552acdf79fSAndrey V. Elsukov */ 44562acdf79fSAndrey V. Elsukov idx = pack_object(tstate, *av, 0); 44572acdf79fSAndrey V. Elsukov if (idx == 0) 44582acdf79fSAndrey V. Elsukov errx(EX_DATAERR, "pack_object failed"); 44592acdf79fSAndrey V. Elsukov fill_cmd(action, O_EXTERNAL_INSTANCE, 0, idx); 44602acdf79fSAndrey V. Elsukov av++; 44612acdf79fSAndrey V. Elsukov } 44629758b77fSLuigi Rizzo } 4463579ed7bdSAlexander V. Chernikov action = next_cmd(action, &ablen); 44649758b77fSLuigi Rizzo 44659758b77fSLuigi Rizzo /* 4466974dfe30SBrian Feldman * [altq queuename] -- altq tag, optional 44679758b77fSLuigi Rizzo * [log [logamount N]] -- log, optional 44689758b77fSLuigi Rizzo * 4469974dfe30SBrian Feldman * If they exist, it go first in the cmdbuf, but then it is 44709758b77fSLuigi Rizzo * skipped in the copy section to the end of the buffer. 44719758b77fSLuigi Rizzo */ 4472cc4d3c30SLuigi Rizzo while (av[0] != NULL && (i = match_token(rule_action_params, *av)) != -1) { 4473cc4d3c30SLuigi Rizzo av++; 4474974dfe30SBrian Feldman switch (i) { 4475974dfe30SBrian Feldman case TOK_LOG: 4476974dfe30SBrian Feldman { 44779758b77fSLuigi Rizzo ipfw_insn_log *c = (ipfw_insn_log *)cmd; 447862ff38aeSLuigi Rizzo int l; 44799758b77fSLuigi Rizzo 4480974dfe30SBrian Feldman if (have_log) 4481974dfe30SBrian Feldman errx(EX_DATAERR, 4482974dfe30SBrian Feldman "log cannot be specified more than once"); 4483974dfe30SBrian Feldman have_log = (ipfw_insn *)c; 44849758b77fSLuigi Rizzo cmd->len = F_INSN_SIZE(ipfw_insn_log); 4485579ed7bdSAlexander V. Chernikov CHECK_CMDLEN; 44869758b77fSLuigi Rizzo cmd->opcode = O_LOG; 4487cc4d3c30SLuigi Rizzo if (av[0] && _substrcmp(*av, "logamount") == 0) { 4488cc4d3c30SLuigi Rizzo av++; 44899758b77fSLuigi Rizzo NEED1("logamount requires argument"); 449062ff38aeSLuigi Rizzo l = atoi(*av); 449162ff38aeSLuigi Rizzo if (l < 0) 4492974dfe30SBrian Feldman errx(EX_DATAERR, 4493974dfe30SBrian Feldman "logamount must be positive"); 449462ff38aeSLuigi Rizzo c->max_log = l; 4495cc4d3c30SLuigi Rizzo av++; 44969ec4f2e1SMaxim Konovalov } else { 44979ec4f2e1SMaxim Konovalov len = sizeof(c->max_log); 44989ec4f2e1SMaxim Konovalov if (sysctlbyname("net.inet.ip.fw.verbose_limit", 4499f71133f6SAlexander V. Chernikov &c->max_log, &len, NULL, 0) == -1) { 450056707beeSMark Johnston if (g_co.test_only) { 4501f71133f6SAlexander V. Chernikov c->max_log = 0; 4502f71133f6SAlexander V. Chernikov break; 4503f71133f6SAlexander V. Chernikov } 45049ec4f2e1SMaxim Konovalov errx(1, "sysctlbyname(\"%s\")", 45059ec4f2e1SMaxim Konovalov "net.inet.ip.fw.verbose_limit"); 45069758b77fSLuigi Rizzo } 4507974dfe30SBrian Feldman } 4508f71133f6SAlexander V. Chernikov } 4509974dfe30SBrian Feldman break; 4510974dfe30SBrian Feldman 4511cc4d3c30SLuigi Rizzo #ifndef NO_ALTQ 4512974dfe30SBrian Feldman case TOK_ALTQ: 4513974dfe30SBrian Feldman { 4514974dfe30SBrian Feldman ipfw_insn_altq *a = (ipfw_insn_altq *)cmd; 4515974dfe30SBrian Feldman 4516974dfe30SBrian Feldman NEED1("missing altq queue name"); 4517974dfe30SBrian Feldman if (have_altq) 4518974dfe30SBrian Feldman errx(EX_DATAERR, 4519974dfe30SBrian Feldman "altq cannot be specified more than once"); 4520974dfe30SBrian Feldman have_altq = (ipfw_insn *)a; 4521974dfe30SBrian Feldman cmd->len = F_INSN_SIZE(ipfw_insn_altq); 4522579ed7bdSAlexander V. Chernikov CHECK_CMDLEN; 4523974dfe30SBrian Feldman cmd->opcode = O_ALTQ; 452423c608c8SLuigi Rizzo a->qid = altq_name_to_qid(*av); 4525cc4d3c30SLuigi Rizzo av++; 4526974dfe30SBrian Feldman } 4527974dfe30SBrian Feldman break; 4528cc4d3c30SLuigi Rizzo #endif 4529974dfe30SBrian Feldman 45306a7d5cb6SOleg Bulyzhin case TOK_TAG: 4531254c4725SOleg Bulyzhin case TOK_UNTAG: { 4532254c4725SOleg Bulyzhin uint16_t tag; 4533254c4725SOleg Bulyzhin 45346a7d5cb6SOleg Bulyzhin if (have_tag) 4535254c4725SOleg Bulyzhin errx(EX_USAGE, "tag and untag cannot be " 4536254c4725SOleg Bulyzhin "specified more than once"); 4537b87ce554SLuigi Rizzo GET_UINT_ARG(tag, IPFW_ARG_MIN, IPFW_ARG_MAX, i, 4538759dd6f7SRoman Kurakin rule_action_params); 45396a7d5cb6SOleg Bulyzhin have_tag = cmd; 4540254c4725SOleg Bulyzhin fill_cmd(cmd, O_TAG, (i == TOK_TAG) ? 0: F_NOT, tag); 4541cc4d3c30SLuigi Rizzo av++; 45426a7d5cb6SOleg Bulyzhin break; 4543254c4725SOleg Bulyzhin } 45446a7d5cb6SOleg Bulyzhin 4545974dfe30SBrian Feldman default: 4546974dfe30SBrian Feldman abort(); 4547974dfe30SBrian Feldman } 4548579ed7bdSAlexander V. Chernikov cmd = next_cmd(cmd, &cblen); 45499758b77fSLuigi Rizzo } 45509758b77fSLuigi Rizzo 45514a2ea55bSAndrey V. Elsukov if (have_state) { /* must be a check-state, we are done */ 45524a2ea55bSAndrey V. Elsukov if (*av != NULL && 45534a2ea55bSAndrey V. Elsukov match_token(rule_options, *av) == TOK_COMMENT) { 45544a2ea55bSAndrey V. Elsukov /* check-state has a comment */ 45554a2ea55bSAndrey V. Elsukov av++; 45564a2ea55bSAndrey V. Elsukov fill_comment(cmd, av, cblen); 45574a2ea55bSAndrey V. Elsukov cmd = next_cmd(cmd, &cblen); 45584a2ea55bSAndrey V. Elsukov av[0] = NULL; 45594a2ea55bSAndrey V. Elsukov } 45609758b77fSLuigi Rizzo goto done; 45614a2ea55bSAndrey V. Elsukov } 45629758b77fSLuigi Rizzo 45639758b77fSLuigi Rizzo #define OR_START(target) \ 4564cc4d3c30SLuigi Rizzo if (av[0] && (*av[0] == '(' || *av[0] == '{')) { \ 45659758b77fSLuigi Rizzo if (open_par) \ 45669758b77fSLuigi Rizzo errx(EX_USAGE, "nested \"(\" not allowed\n"); \ 45678ed2d749SLuigi Rizzo prev = NULL; \ 45689758b77fSLuigi Rizzo open_par = 1; \ 45699758b77fSLuigi Rizzo if ( (av[0])[1] == '\0') { \ 4570cc4d3c30SLuigi Rizzo av++; \ 45719758b77fSLuigi Rizzo } else \ 45729758b77fSLuigi Rizzo (*av)++; \ 45739758b77fSLuigi Rizzo } \ 45749758b77fSLuigi Rizzo target: \ 45759758b77fSLuigi Rizzo 45769758b77fSLuigi Rizzo 45779758b77fSLuigi Rizzo #define CLOSE_PAR \ 45789758b77fSLuigi Rizzo if (open_par) { \ 4579cc4d3c30SLuigi Rizzo if (av[0] && ( \ 458001750186SBrooks Davis strcmp(*av, ")") == 0 || \ 458101750186SBrooks Davis strcmp(*av, "}") == 0)) { \ 45828ed2d749SLuigi Rizzo prev = NULL; \ 45839758b77fSLuigi Rizzo open_par = 0; \ 4584cc4d3c30SLuigi Rizzo av++; \ 45859758b77fSLuigi Rizzo } else \ 45869758b77fSLuigi Rizzo errx(EX_USAGE, "missing \")\"\n"); \ 45879758b77fSLuigi Rizzo } 45889758b77fSLuigi Rizzo 45899758b77fSLuigi Rizzo #define NOT_BLOCK \ 4590cc4d3c30SLuigi Rizzo if (av[0] && _substrcmp(*av, "not") == 0) { \ 45919758b77fSLuigi Rizzo if (cmd->len & F_NOT) \ 45929758b77fSLuigi Rizzo errx(EX_USAGE, "double \"not\" not allowed\n"); \ 45939758b77fSLuigi Rizzo cmd->len |= F_NOT; \ 4594cc4d3c30SLuigi Rizzo av++; \ 45959758b77fSLuigi Rizzo } 45969758b77fSLuigi Rizzo 45979758b77fSLuigi Rizzo #define OR_BLOCK(target) \ 4598cc4d3c30SLuigi Rizzo if (av[0] && _substrcmp(*av, "or") == 0) { \ 45999758b77fSLuigi Rizzo if (prev == NULL || open_par == 0) \ 46009758b77fSLuigi Rizzo errx(EX_DATAERR, "invalid OR block"); \ 46019758b77fSLuigi Rizzo prev->len |= F_OR; \ 4602cc4d3c30SLuigi Rizzo av++; \ 46039758b77fSLuigi Rizzo goto target; \ 46049758b77fSLuigi Rizzo } \ 46059758b77fSLuigi Rizzo CLOSE_PAR; 46069758b77fSLuigi Rizzo 4607e706181bSLuigi Rizzo first_cmd = cmd; 46085a155b40SLuigi Rizzo 46095a155b40SLuigi Rizzo #if 0 4610e706181bSLuigi Rizzo /* 4611e706181bSLuigi Rizzo * MAC addresses, optional. 4612e706181bSLuigi Rizzo * If we have this, we skip the part "proto from src to dst" 4613e706181bSLuigi Rizzo * and jump straight to the option parsing. 4614e706181bSLuigi Rizzo */ 4615e706181bSLuigi Rizzo NOT_BLOCK; 4616e706181bSLuigi Rizzo NEED1("missing protocol"); 461701750186SBrooks Davis if (_substrcmp(*av, "MAC") == 0 || 461801750186SBrooks Davis _substrcmp(*av, "mac") == 0) { 4619cc4d3c30SLuigi Rizzo av++; /* the "MAC" keyword */ 4620cc4d3c30SLuigi Rizzo add_mac(cmd, av); /* exits in case of errors */ 4621e706181bSLuigi Rizzo cmd = next_cmd(cmd); 4622cc4d3c30SLuigi Rizzo av += 2; /* dst-mac and src-mac */ 4623e706181bSLuigi Rizzo NOT_BLOCK; 4624e706181bSLuigi Rizzo NEED1("missing mac type"); 4625cc4d3c30SLuigi Rizzo if (add_mactype(cmd, av[0])) 4626e706181bSLuigi Rizzo cmd = next_cmd(cmd); 4627cc4d3c30SLuigi Rizzo av++; /* any or mac-type */ 4628e706181bSLuigi Rizzo goto read_options; 4629e706181bSLuigi Rizzo } 46305a155b40SLuigi Rizzo #endif 4631e706181bSLuigi Rizzo 46329758b77fSLuigi Rizzo /* 46339758b77fSLuigi Rizzo * protocol, mandatory 46349758b77fSLuigi Rizzo */ 46359758b77fSLuigi Rizzo OR_START(get_proto); 46369758b77fSLuigi Rizzo NOT_BLOCK; 46379758b77fSLuigi Rizzo NEED1("missing protocol"); 463836c263ccSHajimu UMEMOTO if (add_proto_compat(cmd, *av, &proto)) { 4639cc4d3c30SLuigi Rizzo av++; 4640b730879fSMax Laier if (F_LEN(cmd) != 0) { 4641e706181bSLuigi Rizzo prev = cmd; 4642579ed7bdSAlexander V. Chernikov cmd = next_cmd(cmd, &cblen); 4643e706181bSLuigi Rizzo } 46445a155b40SLuigi Rizzo } else if (first_cmd != cmd) { 4645c82b8dceSMaxim Konovalov errx(EX_DATAERR, "invalid protocol ``%s''", *av); 4646094d6f8dSAndrey V. Elsukov } else { 4647094d6f8dSAndrey V. Elsukov rule->flags |= IPFW_RULE_JUSTOPTS; 46485a155b40SLuigi Rizzo goto read_options; 4649094d6f8dSAndrey V. Elsukov } 46509758b77fSLuigi Rizzo OR_BLOCK(get_proto); 46519758b77fSLuigi Rizzo 465255507128SAndrey V. Elsukov first_cmd = cmd; /* update pointer to use in compact form */ 465355507128SAndrey V. Elsukov 46549758b77fSLuigi Rizzo /* 4655e706181bSLuigi Rizzo * "from", mandatory 46569758b77fSLuigi Rizzo */ 4657cc4d3c30SLuigi Rizzo if ((av[0] == NULL) || _substrcmp(*av, "from") != 0) 46589758b77fSLuigi Rizzo errx(EX_USAGE, "missing ``from''"); 4659cc4d3c30SLuigi Rizzo av++; 46609758b77fSLuigi Rizzo 46619758b77fSLuigi Rizzo /* 46629758b77fSLuigi Rizzo * source IP, mandatory 46639758b77fSLuigi Rizzo */ 46649758b77fSLuigi Rizzo OR_START(source_ip); 46659758b77fSLuigi Rizzo NOT_BLOCK; /* optional "not" */ 46669758b77fSLuigi Rizzo NEED1("missing source address"); 46676c2997ffSAlexander V. Chernikov if (add_src(cmd, *av, proto, cblen, tstate)) { 4668cc4d3c30SLuigi Rizzo av++; 4669e706181bSLuigi Rizzo if (F_LEN(cmd) != 0) { /* ! any */ 4670e706181bSLuigi Rizzo prev = cmd; 4671579ed7bdSAlexander V. Chernikov cmd = next_cmd(cmd, &cblen); 4672e706181bSLuigi Rizzo } 46738195404bSBrooks Davis } else 46748195404bSBrooks Davis errx(EX_USAGE, "bad source address %s", *av); 46759758b77fSLuigi Rizzo OR_BLOCK(source_ip); 46769758b77fSLuigi Rizzo 46779758b77fSLuigi Rizzo /* 46789758b77fSLuigi Rizzo * source ports, optional 46799758b77fSLuigi Rizzo */ 46809758b77fSLuigi Rizzo NOT_BLOCK; /* optional "not" */ 4681cc4d3c30SLuigi Rizzo if ( av[0] != NULL ) { 468201750186SBrooks Davis if (_substrcmp(*av, "any") == 0 || 4683579ed7bdSAlexander V. Chernikov add_ports(cmd, *av, proto, O_IP_SRCPORT, cblen)) { 4684cc4d3c30SLuigi Rizzo av++; 4685e706181bSLuigi Rizzo if (F_LEN(cmd) != 0) 4686579ed7bdSAlexander V. Chernikov cmd = next_cmd(cmd, &cblen); 46879758b77fSLuigi Rizzo } 46888ed2d749SLuigi Rizzo } 46899758b77fSLuigi Rizzo 46909758b77fSLuigi Rizzo /* 4691e706181bSLuigi Rizzo * "to", mandatory 46929758b77fSLuigi Rizzo */ 4693cc4d3c30SLuigi Rizzo if ( (av[0] == NULL) || _substrcmp(*av, "to") != 0 ) 46949758b77fSLuigi Rizzo errx(EX_USAGE, "missing ``to''"); 4695cc4d3c30SLuigi Rizzo av++; 46969758b77fSLuigi Rizzo 46979758b77fSLuigi Rizzo /* 46989758b77fSLuigi Rizzo * destination, mandatory 46999758b77fSLuigi Rizzo */ 47009758b77fSLuigi Rizzo OR_START(dest_ip); 47019758b77fSLuigi Rizzo NOT_BLOCK; /* optional "not" */ 47029758b77fSLuigi Rizzo NEED1("missing dst address"); 47036c2997ffSAlexander V. Chernikov if (add_dst(cmd, *av, proto, cblen, tstate)) { 4704cc4d3c30SLuigi Rizzo av++; 4705e706181bSLuigi Rizzo if (F_LEN(cmd) != 0) { /* ! any */ 47069758b77fSLuigi Rizzo prev = cmd; 4707579ed7bdSAlexander V. Chernikov cmd = next_cmd(cmd, &cblen); 4708e706181bSLuigi Rizzo } 47098195404bSBrooks Davis } else 47108195404bSBrooks Davis errx( EX_USAGE, "bad destination address %s", *av); 47119758b77fSLuigi Rizzo OR_BLOCK(dest_ip); 47129758b77fSLuigi Rizzo 47139758b77fSLuigi Rizzo /* 47149758b77fSLuigi Rizzo * dest. ports, optional 47159758b77fSLuigi Rizzo */ 47169758b77fSLuigi Rizzo NOT_BLOCK; /* optional "not" */ 4717cc4d3c30SLuigi Rizzo if (av[0]) { 471801750186SBrooks Davis if (_substrcmp(*av, "any") == 0 || 4719579ed7bdSAlexander V. Chernikov add_ports(cmd, *av, proto, O_IP_DSTPORT, cblen)) { 4720cc4d3c30SLuigi Rizzo av++; 4721e706181bSLuigi Rizzo if (F_LEN(cmd) != 0) 4722579ed7bdSAlexander V. Chernikov cmd = next_cmd(cmd, &cblen); 47239758b77fSLuigi Rizzo } 47248ed2d749SLuigi Rizzo } 472555507128SAndrey V. Elsukov if (first_cmd == cmd) 472655507128SAndrey V. Elsukov rule->flags |= IPFW_RULE_NOOPT; 47279758b77fSLuigi Rizzo 47289758b77fSLuigi Rizzo read_options: 47299758b77fSLuigi Rizzo prev = NULL; 4730cc4d3c30SLuigi Rizzo while ( av[0] != NULL ) { 47318ed2d749SLuigi Rizzo char *s; 47328ed2d749SLuigi Rizzo ipfw_insn_u32 *cmd32; /* alias for cmd */ 47338ed2d749SLuigi Rizzo 47348ed2d749SLuigi Rizzo s = *av; 47358ed2d749SLuigi Rizzo cmd32 = (ipfw_insn_u32 *)cmd; 47369758b77fSLuigi Rizzo 47379758b77fSLuigi Rizzo if (*s == '!') { /* alternate syntax for NOT */ 47389758b77fSLuigi Rizzo if (cmd->len & F_NOT) 47399758b77fSLuigi Rizzo errx(EX_USAGE, "double \"not\" not allowed\n"); 47409758b77fSLuigi Rizzo cmd->len = F_NOT; 47419758b77fSLuigi Rizzo s++; 47429758b77fSLuigi Rizzo } 47439758b77fSLuigi Rizzo i = match_token(rule_options, s); 4744cc4d3c30SLuigi Rizzo av++; 47459758b77fSLuigi Rizzo switch(i) { 47469758b77fSLuigi Rizzo case TOK_NOT: 47479758b77fSLuigi Rizzo if (cmd->len & F_NOT) 47489758b77fSLuigi Rizzo errx(EX_USAGE, "double \"not\" not allowed\n"); 47499758b77fSLuigi Rizzo cmd->len = F_NOT; 47509758b77fSLuigi Rizzo break; 47519758b77fSLuigi Rizzo 47529758b77fSLuigi Rizzo case TOK_OR: 47538ed2d749SLuigi Rizzo if (open_par == 0 || prev == NULL) 47549758b77fSLuigi Rizzo errx(EX_USAGE, "invalid \"or\" block\n"); 47559758b77fSLuigi Rizzo prev->len |= F_OR; 47569758b77fSLuigi Rizzo break; 47579758b77fSLuigi Rizzo 47588ed2d749SLuigi Rizzo case TOK_STARTBRACE: 47598ed2d749SLuigi Rizzo if (open_par) 47608ed2d749SLuigi Rizzo errx(EX_USAGE, "+nested \"(\" not allowed\n"); 47618ed2d749SLuigi Rizzo open_par = 1; 47628ed2d749SLuigi Rizzo break; 47638ed2d749SLuigi Rizzo 47648ed2d749SLuigi Rizzo case TOK_ENDBRACE: 47658ed2d749SLuigi Rizzo if (!open_par) 47668ed2d749SLuigi Rizzo errx(EX_USAGE, "+missing \")\"\n"); 47678ed2d749SLuigi Rizzo open_par = 0; 4768e706181bSLuigi Rizzo prev = NULL; 47698ed2d749SLuigi Rizzo break; 47708ed2d749SLuigi Rizzo 47719758b77fSLuigi Rizzo case TOK_IN: 47729758b77fSLuigi Rizzo fill_cmd(cmd, O_IN, 0, 0); 47739758b77fSLuigi Rizzo break; 47749758b77fSLuigi Rizzo 47759758b77fSLuigi Rizzo case TOK_OUT: 47769758b77fSLuigi Rizzo cmd->len ^= F_NOT; /* toggle F_NOT */ 47779758b77fSLuigi Rizzo fill_cmd(cmd, O_IN, 0, 0); 47789758b77fSLuigi Rizzo break; 47799758b77fSLuigi Rizzo 47806daf7ebdSBrian Feldman case TOK_DIVERTED: 47816daf7ebdSBrian Feldman fill_cmd(cmd, O_DIVERTED, 0, 3); 47826daf7ebdSBrian Feldman break; 47836daf7ebdSBrian Feldman 47846daf7ebdSBrian Feldman case TOK_DIVERTEDLOOPBACK: 47856daf7ebdSBrian Feldman fill_cmd(cmd, O_DIVERTED, 0, 1); 47866daf7ebdSBrian Feldman break; 47876daf7ebdSBrian Feldman 47886daf7ebdSBrian Feldman case TOK_DIVERTEDOUTPUT: 47896daf7ebdSBrian Feldman fill_cmd(cmd, O_DIVERTED, 0, 2); 47906daf7ebdSBrian Feldman break; 47916daf7ebdSBrian Feldman 4792b876085fSAndrey V. Elsukov case TOK_FRAG: { 4793b876085fSAndrey V. Elsukov uint32_t set = 0, clear = 0; 4794b876085fSAndrey V. Elsukov 4795b876085fSAndrey V. Elsukov if (*av != NULL && fill_flags(f_ipoff, *av, NULL, 4796b876085fSAndrey V. Elsukov &set, &clear) == 0) 4797b876085fSAndrey V. Elsukov av++; 4798b876085fSAndrey V. Elsukov else { 4799825398f9SGleb Smirnoff /* 4800825398f9SGleb Smirnoff * Compatibility: no argument after "frag" 4801825398f9SGleb Smirnoff * keyword equals to "frag offset". 4802825398f9SGleb Smirnoff */ 4803b876085fSAndrey V. Elsukov set = 0x01; 4804b876085fSAndrey V. Elsukov clear = 0; 4805b876085fSAndrey V. Elsukov } 4806b876085fSAndrey V. Elsukov fill_cmd(cmd, O_FRAG, 0, 4807b876085fSAndrey V. Elsukov (set & 0xff) | ( (clear & 0xff) << 8)); 48089758b77fSLuigi Rizzo break; 4809b876085fSAndrey V. Elsukov } 48109758b77fSLuigi Rizzo 48119758b77fSLuigi Rizzo case TOK_LAYER2: 48129758b77fSLuigi Rizzo fill_cmd(cmd, O_LAYER2, 0, 0); 48139758b77fSLuigi Rizzo break; 48149758b77fSLuigi Rizzo 48159758b77fSLuigi Rizzo case TOK_XMIT: 48169758b77fSLuigi Rizzo case TOK_RECV: 48179758b77fSLuigi Rizzo case TOK_VIA: 48189758b77fSLuigi Rizzo NEED1("recv, xmit, via require interface name" 48199758b77fSLuigi Rizzo " or address"); 48206c2997ffSAlexander V. Chernikov fill_iface((ipfw_insn_if *)cmd, av[0], cblen, tstate); 4821cc4d3c30SLuigi Rizzo av++; 48229758b77fSLuigi Rizzo if (F_LEN(cmd) == 0) /* not a valid address */ 48239758b77fSLuigi Rizzo break; 48249758b77fSLuigi Rizzo if (i == TOK_XMIT) 48259758b77fSLuigi Rizzo cmd->opcode = O_XMIT; 48269758b77fSLuigi Rizzo else if (i == TOK_RECV) 48279758b77fSLuigi Rizzo cmd->opcode = O_RECV; 48289758b77fSLuigi Rizzo else if (i == TOK_VIA) 48299758b77fSLuigi Rizzo cmd->opcode = O_VIA; 48309758b77fSLuigi Rizzo break; 48319758b77fSLuigi Rizzo 48325e43aef8SLuigi Rizzo case TOK_ICMPTYPES: 48335e43aef8SLuigi Rizzo NEED1("icmptypes requires list of types"); 48345e43aef8SLuigi Rizzo fill_icmptypes((ipfw_insn_u32 *)cmd, *av); 4835cc4d3c30SLuigi Rizzo av++; 48365e43aef8SLuigi Rizzo break; 48375e43aef8SLuigi Rizzo 48388195404bSBrooks Davis case TOK_ICMP6TYPES: 48398195404bSBrooks Davis NEED1("icmptypes requires list of types"); 4840579ed7bdSAlexander V. Chernikov fill_icmp6types((ipfw_insn_icmp6 *)cmd, *av, cblen); 4841cc4d3c30SLuigi Rizzo av++; 48428195404bSBrooks Davis break; 48438195404bSBrooks Davis 48449758b77fSLuigi Rizzo case TOK_IPTTL: 48459758b77fSLuigi Rizzo NEED1("ipttl requires TTL"); 484644c884e1SLuigi Rizzo if (strpbrk(*av, "-,")) { 4847579ed7bdSAlexander V. Chernikov if (!add_ports(cmd, *av, 0, O_IPTTL, cblen)) 484844c884e1SLuigi Rizzo errx(EX_DATAERR, "invalid ipttl %s", *av); 484944c884e1SLuigi Rizzo } else 48509758b77fSLuigi Rizzo fill_cmd(cmd, O_IPTTL, 0, strtoul(*av, NULL, 0)); 4851cc4d3c30SLuigi Rizzo av++; 48529758b77fSLuigi Rizzo break; 48539758b77fSLuigi Rizzo 48549758b77fSLuigi Rizzo case TOK_IPID: 485544c884e1SLuigi Rizzo NEED1("ipid requires id"); 485644c884e1SLuigi Rizzo if (strpbrk(*av, "-,")) { 4857579ed7bdSAlexander V. Chernikov if (!add_ports(cmd, *av, 0, O_IPID, cblen)) 485844c884e1SLuigi Rizzo errx(EX_DATAERR, "invalid ipid %s", *av); 485944c884e1SLuigi Rizzo } else 48609758b77fSLuigi Rizzo fill_cmd(cmd, O_IPID, 0, strtoul(*av, NULL, 0)); 4861cc4d3c30SLuigi Rizzo av++; 48629758b77fSLuigi Rizzo break; 48639758b77fSLuigi Rizzo 48649758b77fSLuigi Rizzo case TOK_IPLEN: 48659758b77fSLuigi Rizzo NEED1("iplen requires length"); 486644c884e1SLuigi Rizzo if (strpbrk(*av, "-,")) { 4867579ed7bdSAlexander V. Chernikov if (!add_ports(cmd, *av, 0, O_IPLEN, cblen)) 486844c884e1SLuigi Rizzo errx(EX_DATAERR, "invalid ip len %s", *av); 486944c884e1SLuigi Rizzo } else 48709758b77fSLuigi Rizzo fill_cmd(cmd, O_IPLEN, 0, strtoul(*av, NULL, 0)); 4871cc4d3c30SLuigi Rizzo av++; 48729758b77fSLuigi Rizzo break; 48739758b77fSLuigi Rizzo 48749758b77fSLuigi Rizzo case TOK_IPVER: 48759758b77fSLuigi Rizzo NEED1("ipver requires version"); 48769758b77fSLuigi Rizzo fill_cmd(cmd, O_IPVER, 0, strtoul(*av, NULL, 0)); 4877cc4d3c30SLuigi Rizzo av++; 48789758b77fSLuigi Rizzo break; 48799758b77fSLuigi Rizzo 48805e43aef8SLuigi Rizzo case TOK_IPPRECEDENCE: 48815e43aef8SLuigi Rizzo NEED1("ipprecedence requires value"); 48825e43aef8SLuigi Rizzo fill_cmd(cmd, O_IPPRECEDENCE, 0, 48835e43aef8SLuigi Rizzo (strtoul(*av, NULL, 0) & 7) << 5); 4884cc4d3c30SLuigi Rizzo av++; 48855e43aef8SLuigi Rizzo break; 48865e43aef8SLuigi Rizzo 4887ae01d73cSAlexander V. Chernikov case TOK_DSCP: 4888ae01d73cSAlexander V. Chernikov NEED1("missing DSCP code"); 4889ae01d73cSAlexander V. Chernikov fill_dscp(cmd, *av, cblen); 4890ae01d73cSAlexander V. Chernikov av++; 4891ae01d73cSAlexander V. Chernikov break; 4892ae01d73cSAlexander V. Chernikov 48939758b77fSLuigi Rizzo case TOK_IPOPTS: 48949758b77fSLuigi Rizzo NEED1("missing argument for ipoptions"); 4895914bffb6SAlexander V. Chernikov fill_flags_cmd(cmd, O_IPOPT, f_ipopts, *av); 4896cc4d3c30SLuigi Rizzo av++; 48979758b77fSLuigi Rizzo break; 48989758b77fSLuigi Rizzo 48995e43aef8SLuigi Rizzo case TOK_IPTOS: 49005e43aef8SLuigi Rizzo NEED1("missing argument for iptos"); 4901914bffb6SAlexander V. Chernikov fill_flags_cmd(cmd, O_IPTOS, f_iptos, *av); 4902cc4d3c30SLuigi Rizzo av++; 49035e43aef8SLuigi Rizzo break; 49045e43aef8SLuigi Rizzo 49059758b77fSLuigi Rizzo case TOK_UID: 49069758b77fSLuigi Rizzo NEED1("uid requires argument"); 49079758b77fSLuigi Rizzo { 49089758b77fSLuigi Rizzo char *end; 49099758b77fSLuigi Rizzo uid_t uid; 49109758b77fSLuigi Rizzo struct passwd *pwd; 49119758b77fSLuigi Rizzo 49129758b77fSLuigi Rizzo cmd->opcode = O_UID; 49139758b77fSLuigi Rizzo uid = strtoul(*av, &end, 0); 49149758b77fSLuigi Rizzo pwd = (*end == '\0') ? getpwuid(uid) : getpwnam(*av); 49159758b77fSLuigi Rizzo if (pwd == NULL) 49169758b77fSLuigi Rizzo errx(EX_DATAERR, "uid \"%s\" nonexistent", *av); 4917d6abaeebSMaxim Konovalov cmd32->d[0] = pwd->pw_uid; 49183a27af0dSChristian S.J. Peron cmd->len |= F_INSN_SIZE(ipfw_insn_u32); 4919cc4d3c30SLuigi Rizzo av++; 49209758b77fSLuigi Rizzo } 49219758b77fSLuigi Rizzo break; 49229758b77fSLuigi Rizzo 49239758b77fSLuigi Rizzo case TOK_GID: 49249758b77fSLuigi Rizzo NEED1("gid requires argument"); 49259758b77fSLuigi Rizzo { 49269758b77fSLuigi Rizzo char *end; 49279758b77fSLuigi Rizzo gid_t gid; 49289758b77fSLuigi Rizzo struct group *grp; 49299758b77fSLuigi Rizzo 49309758b77fSLuigi Rizzo cmd->opcode = O_GID; 49319758b77fSLuigi Rizzo gid = strtoul(*av, &end, 0); 49329758b77fSLuigi Rizzo grp = (*end == '\0') ? getgrgid(gid) : getgrnam(*av); 49339758b77fSLuigi Rizzo if (grp == NULL) 49349758b77fSLuigi Rizzo errx(EX_DATAERR, "gid \"%s\" nonexistent", *av); 4935d6abaeebSMaxim Konovalov cmd32->d[0] = grp->gr_gid; 49363a27af0dSChristian S.J. Peron cmd->len |= F_INSN_SIZE(ipfw_insn_u32); 4937cc4d3c30SLuigi Rizzo av++; 49389758b77fSLuigi Rizzo } 49399758b77fSLuigi Rizzo break; 49409758b77fSLuigi Rizzo 494131c88a30SChristian S.J. Peron case TOK_JAIL: 494231c88a30SChristian S.J. Peron NEED1("jail requires argument"); 494331c88a30SChristian S.J. Peron { 4944c144616bSKyle Evans char *end; 494531c88a30SChristian S.J. Peron int jid; 494631c88a30SChristian S.J. Peron 494731c88a30SChristian S.J. Peron cmd->opcode = O_JAIL; 4948c144616bSKyle Evans /* 4949c144616bSKyle Evans * If av is a number, then we'll just pass it as-is. If 4950c144616bSKyle Evans * it's a name, try to resolve that to a jid. 4951c144616bSKyle Evans * 4952c144616bSKyle Evans * We save the jail_getid(3) call for a fallback because 4953c144616bSKyle Evans * it entails an unconditional trip to the kernel to 4954c144616bSKyle Evans * either validate a jid or resolve a name to a jid. 4955c144616bSKyle Evans * This specific token doesn't currently require a 4956c144616bSKyle Evans * jid to be an active jail, so we save a transition 4957c144616bSKyle Evans * by simply using a number that we're given. 4958c144616bSKyle Evans */ 4959c144616bSKyle Evans jid = strtoul(*av, &end, 10); 4960c144616bSKyle Evans if (*end != '\0') { 4961de68a320SJamie Gritton jid = jail_getid(*av); 4962de68a320SJamie Gritton if (jid < 0) 4963de68a320SJamie Gritton errx(EX_DATAERR, "%s", jail_errmsg); 4964c144616bSKyle Evans } 4965d413c2e4SChristian S.J. Peron cmd32->d[0] = (uint32_t)jid; 49663a27af0dSChristian S.J. Peron cmd->len |= F_INSN_SIZE(ipfw_insn_u32); 4967cc4d3c30SLuigi Rizzo av++; 496831c88a30SChristian S.J. Peron } 496931c88a30SChristian S.J. Peron break; 497031c88a30SChristian S.J. Peron 49719758b77fSLuigi Rizzo case TOK_ESTAB: 49729758b77fSLuigi Rizzo fill_cmd(cmd, O_ESTAB, 0, 0); 49739758b77fSLuigi Rizzo break; 49749758b77fSLuigi Rizzo 49759758b77fSLuigi Rizzo case TOK_SETUP: 49769758b77fSLuigi Rizzo fill_cmd(cmd, O_TCPFLAGS, 0, 49779758b77fSLuigi Rizzo (TH_SYN) | ( (TH_ACK) & 0xff) <<8 ); 49789758b77fSLuigi Rizzo break; 49799758b77fSLuigi Rizzo 4980c99ee9e0SBrian Feldman case TOK_TCPDATALEN: 4981c99ee9e0SBrian Feldman NEED1("tcpdatalen requires length"); 4982c99ee9e0SBrian Feldman if (strpbrk(*av, "-,")) { 4983579ed7bdSAlexander V. Chernikov if (!add_ports(cmd, *av, 0, O_TCPDATALEN, cblen)) 4984c99ee9e0SBrian Feldman errx(EX_DATAERR, "invalid tcpdata len %s", *av); 4985c99ee9e0SBrian Feldman } else 4986c99ee9e0SBrian Feldman fill_cmd(cmd, O_TCPDATALEN, 0, 4987c99ee9e0SBrian Feldman strtoul(*av, NULL, 0)); 4988cc4d3c30SLuigi Rizzo av++; 4989c99ee9e0SBrian Feldman break; 4990c99ee9e0SBrian Feldman 49919758b77fSLuigi Rizzo case TOK_TCPOPTS: 49929758b77fSLuigi Rizzo NEED1("missing argument for tcpoptions"); 4993914bffb6SAlexander V. Chernikov fill_flags_cmd(cmd, O_TCPOPTS, f_tcpopts, *av); 4994cc4d3c30SLuigi Rizzo av++; 49959758b77fSLuigi Rizzo break; 49969758b77fSLuigi Rizzo 49979758b77fSLuigi Rizzo case TOK_TCPSEQ: 49989758b77fSLuigi Rizzo case TOK_TCPACK: 49999758b77fSLuigi Rizzo NEED1("tcpseq/tcpack requires argument"); 50009758b77fSLuigi Rizzo cmd->len = F_INSN_SIZE(ipfw_insn_u32); 50019758b77fSLuigi Rizzo cmd->opcode = (i == TOK_TCPSEQ) ? O_TCPSEQ : O_TCPACK; 50029758b77fSLuigi Rizzo cmd32->d[0] = htonl(strtoul(*av, NULL, 0)); 5003cc4d3c30SLuigi Rizzo av++; 50049758b77fSLuigi Rizzo break; 50059758b77fSLuigi Rizzo 5006978f2d17SAndrey V. Elsukov case TOK_TCPMSS: 50079758b77fSLuigi Rizzo case TOK_TCPWIN: 5008978f2d17SAndrey V. Elsukov NEED1("tcpmss/tcpwin requires size"); 500923ccd3d9SGleb Smirnoff if (strpbrk(*av, "-,")) { 5010978f2d17SAndrey V. Elsukov if (add_ports(cmd, *av, 0, 5011978f2d17SAndrey V. Elsukov i == TOK_TCPWIN ? O_TCPWIN : O_TCPMSS, 5012978f2d17SAndrey V. Elsukov cblen) == NULL) 5013978f2d17SAndrey V. Elsukov errx(EX_DATAERR, "invalid %s size %s", 5014978f2d17SAndrey V. Elsukov s, *av); 501523ccd3d9SGleb Smirnoff } else 5016978f2d17SAndrey V. Elsukov fill_cmd(cmd, i == TOK_TCPWIN ? O_TCPWIN : 5017978f2d17SAndrey V. Elsukov O_TCPMSS, 0, strtoul(*av, NULL, 0)); 5018cc4d3c30SLuigi Rizzo av++; 50199758b77fSLuigi Rizzo break; 50209758b77fSLuigi Rizzo 50219758b77fSLuigi Rizzo case TOK_TCPFLAGS: 50229758b77fSLuigi Rizzo NEED1("missing argument for tcpflags"); 50239758b77fSLuigi Rizzo cmd->opcode = O_TCPFLAGS; 5024914bffb6SAlexander V. Chernikov fill_flags_cmd(cmd, O_TCPFLAGS, f_tcpflags, *av); 5025cc4d3c30SLuigi Rizzo av++; 50269758b77fSLuigi Rizzo break; 50279758b77fSLuigi Rizzo 5028f7c4fdeeSAndrey V. Elsukov case TOK_KEEPSTATE: 5029f7c4fdeeSAndrey V. Elsukov case TOK_RECORDSTATE: { 5030ed22e564SAndrey V. Elsukov uint16_t uidx; 5031ed22e564SAndrey V. Elsukov 50328ed2d749SLuigi Rizzo if (open_par) 5033f7c4fdeeSAndrey V. Elsukov errx(EX_USAGE, "keep-state or record-state cannot be part " 50348ed2d749SLuigi Rizzo "of an or block"); 50350a7197a8SLuigi Rizzo if (have_state) 5036f7c4fdeeSAndrey V. Elsukov errx(EX_USAGE, "only one of keep-state, record-state, " 5037f7c4fdeeSAndrey V. Elsukov " limit and set-limit is allowed"); 50386ed14738SAndrey V. Elsukov if (*av != NULL && *av[0] == ':') { 50396ed14738SAndrey V. Elsukov if (state_check_name(*av + 1) != 0) 5040ed22e564SAndrey V. Elsukov errx(EX_DATAERR, 5041ed22e564SAndrey V. Elsukov "Invalid state name %s", *av); 50426ed14738SAndrey V. Elsukov uidx = pack_object(tstate, *av + 1, 5043ed22e564SAndrey V. Elsukov IPFW_TLV_STATE_NAME); 5044ed22e564SAndrey V. Elsukov av++; 50456ed14738SAndrey V. Elsukov } else 50466ed14738SAndrey V. Elsukov uidx = pack_object(tstate, default_state_name, 50476ed14738SAndrey V. Elsukov IPFW_TLV_STATE_NAME); 504852bc23abSLuigi Rizzo have_state = cmd; 5049f7c4fdeeSAndrey V. Elsukov have_rstate = i == TOK_RECORDSTATE; 5050ed22e564SAndrey V. Elsukov fill_cmd(cmd, O_KEEP_STATE, 0, uidx); 50519758b77fSLuigi Rizzo break; 5052ed22e564SAndrey V. Elsukov } 50539758b77fSLuigi Rizzo 5054f7c4fdeeSAndrey V. Elsukov case TOK_LIMIT: 5055f7c4fdeeSAndrey V. Elsukov case TOK_SETLIMIT: { 50569758b77fSLuigi Rizzo ipfw_insn_limit *c = (ipfw_insn_limit *)cmd; 5057254c4725SOleg Bulyzhin int val; 5058254c4725SOleg Bulyzhin 5059254c4725SOleg Bulyzhin if (open_par) 5060254c4725SOleg Bulyzhin errx(EX_USAGE, 5061f7c4fdeeSAndrey V. Elsukov "limit or set-limit cannot be part of an or block"); 5062254c4725SOleg Bulyzhin if (have_state) 5063f7c4fdeeSAndrey V. Elsukov errx(EX_USAGE, "only one of keep-state, record-state, " 5064f7c4fdeeSAndrey V. Elsukov " limit and set-limit is allowed"); 5065254c4725SOleg Bulyzhin have_state = cmd; 5066f7c4fdeeSAndrey V. Elsukov have_rstate = i == TOK_SETLIMIT; 50679758b77fSLuigi Rizzo 50689758b77fSLuigi Rizzo cmd->len = F_INSN_SIZE(ipfw_insn_limit); 5069579ed7bdSAlexander V. Chernikov CHECK_CMDLEN; 50709758b77fSLuigi Rizzo cmd->opcode = O_LIMIT; 5071254c4725SOleg Bulyzhin c->limit_mask = c->conn_limit = 0; 50729758b77fSLuigi Rizzo 5073cc4d3c30SLuigi Rizzo while ( av[0] != NULL ) { 5074254c4725SOleg Bulyzhin if ((val = match_token(limit_masks, *av)) <= 0) 50759758b77fSLuigi Rizzo break; 50769758b77fSLuigi Rizzo c->limit_mask |= val; 5077cc4d3c30SLuigi Rizzo av++; 50789758b77fSLuigi Rizzo } 5079254c4725SOleg Bulyzhin 50809758b77fSLuigi Rizzo if (c->limit_mask == 0) 5081254c4725SOleg Bulyzhin errx(EX_USAGE, "limit: missing limit mask"); 5082254c4725SOleg Bulyzhin 5083b87ce554SLuigi Rizzo GET_UINT_ARG(c->conn_limit, IPFW_ARG_MIN, IPFW_ARG_MAX, 5084759dd6f7SRoman Kurakin TOK_LIMIT, rule_options); 5085cc4d3c30SLuigi Rizzo av++; 5086ed22e564SAndrey V. Elsukov 50876ed14738SAndrey V. Elsukov if (*av != NULL && *av[0] == ':') { 50886ed14738SAndrey V. Elsukov if (state_check_name(*av + 1) != 0) 5089ed22e564SAndrey V. Elsukov errx(EX_DATAERR, 5090ed22e564SAndrey V. Elsukov "Invalid state name %s", *av); 50916ed14738SAndrey V. Elsukov cmd->arg1 = pack_object(tstate, *av + 1, 5092ed22e564SAndrey V. Elsukov IPFW_TLV_STATE_NAME); 5093ed22e564SAndrey V. Elsukov av++; 50946ed14738SAndrey V. Elsukov } else 50956ed14738SAndrey V. Elsukov cmd->arg1 = pack_object(tstate, 50966ed14738SAndrey V. Elsukov default_state_name, IPFW_TLV_STATE_NAME); 50979758b77fSLuigi Rizzo break; 5098254c4725SOleg Bulyzhin } 50999758b77fSLuigi Rizzo 5100e706181bSLuigi Rizzo case TOK_PROTO: 5101e706181bSLuigi Rizzo NEED1("missing protocol"); 51028195404bSBrooks Davis if (add_proto(cmd, *av, &proto)) { 5103cc4d3c30SLuigi Rizzo av++; 51045a155b40SLuigi Rizzo } else 5105c82b8dceSMaxim Konovalov errx(EX_DATAERR, "invalid protocol ``%s''", 5106c82b8dceSMaxim Konovalov *av); 5107e706181bSLuigi Rizzo break; 5108e706181bSLuigi Rizzo 5109e706181bSLuigi Rizzo case TOK_SRCIP: 5110e706181bSLuigi Rizzo NEED1("missing source IP"); 51116c2997ffSAlexander V. Chernikov if (add_srcip(cmd, *av, cblen, tstate)) { 5112cc4d3c30SLuigi Rizzo av++; 5113e706181bSLuigi Rizzo } 5114e706181bSLuigi Rizzo break; 5115e706181bSLuigi Rizzo 5116e706181bSLuigi Rizzo case TOK_DSTIP: 5117e706181bSLuigi Rizzo NEED1("missing destination IP"); 51186c2997ffSAlexander V. Chernikov if (add_dstip(cmd, *av, cblen, tstate)) { 5119cc4d3c30SLuigi Rizzo av++; 5120e706181bSLuigi Rizzo } 5121e706181bSLuigi Rizzo break; 5122e706181bSLuigi Rizzo 51238195404bSBrooks Davis case TOK_SRCIP6: 51248195404bSBrooks Davis NEED1("missing source IP6"); 5125757b5d87SAndrey V. Elsukov if (add_srcip6(cmd, *av, cblen, tstate)) { 5126cc4d3c30SLuigi Rizzo av++; 51278195404bSBrooks Davis } 51288195404bSBrooks Davis break; 51298195404bSBrooks Davis 51308195404bSBrooks Davis case TOK_DSTIP6: 51318195404bSBrooks Davis NEED1("missing destination IP6"); 5132757b5d87SAndrey V. Elsukov if (add_dstip6(cmd, *av, cblen, tstate)) { 5133cc4d3c30SLuigi Rizzo av++; 51348195404bSBrooks Davis } 51358195404bSBrooks Davis break; 51368195404bSBrooks Davis 513781cac390SArseny Smalyuk 513881cac390SArseny Smalyuk case TOK_SRCMAC: 513981cac390SArseny Smalyuk NEED1("missing source MAC"); 514081cac390SArseny Smalyuk if (add_srcmac(cmd, *av, tstate)) { 514181cac390SArseny Smalyuk av++; 514281cac390SArseny Smalyuk } 514381cac390SArseny Smalyuk break; 514481cac390SArseny Smalyuk 514581cac390SArseny Smalyuk case TOK_DSTMAC: 514681cac390SArseny Smalyuk NEED1("missing destination MAC"); 514781cac390SArseny Smalyuk if (add_dstmac(cmd, *av, tstate)) { 514881cac390SArseny Smalyuk av++; 514981cac390SArseny Smalyuk } 515081cac390SArseny Smalyuk break; 515181cac390SArseny Smalyuk 5152e706181bSLuigi Rizzo case TOK_SRCPORT: 5153e706181bSLuigi Rizzo NEED1("missing source port"); 515401750186SBrooks Davis if (_substrcmp(*av, "any") == 0 || 5155579ed7bdSAlexander V. Chernikov add_ports(cmd, *av, proto, O_IP_SRCPORT, cblen)) { 5156cc4d3c30SLuigi Rizzo av++; 5157e706181bSLuigi Rizzo } else 5158e706181bSLuigi Rizzo errx(EX_DATAERR, "invalid source port %s", *av); 5159e706181bSLuigi Rizzo break; 5160e706181bSLuigi Rizzo 5161e706181bSLuigi Rizzo case TOK_DSTPORT: 5162e706181bSLuigi Rizzo NEED1("missing destination port"); 516301750186SBrooks Davis if (_substrcmp(*av, "any") == 0 || 5164579ed7bdSAlexander V. Chernikov add_ports(cmd, *av, proto, O_IP_DSTPORT, cblen)) { 5165cc4d3c30SLuigi Rizzo av++; 5166e706181bSLuigi Rizzo } else 5167e706181bSLuigi Rizzo errx(EX_DATAERR, "invalid destination port %s", 5168e706181bSLuigi Rizzo *av); 5169e706181bSLuigi Rizzo break; 5170e706181bSLuigi Rizzo 5171e706181bSLuigi Rizzo case TOK_MAC: 5172579ed7bdSAlexander V. Chernikov if (add_mac(cmd, av, cblen)) 5173cc4d3c30SLuigi Rizzo av += 2; 5174e706181bSLuigi Rizzo break; 5175e706181bSLuigi Rizzo 5176e706181bSLuigi Rizzo case TOK_MACTYPE: 5177e706181bSLuigi Rizzo NEED1("missing mac type"); 5178579ed7bdSAlexander V. Chernikov if (!add_mactype(cmd, *av, cblen)) 5179c82b8dceSMaxim Konovalov errx(EX_DATAERR, "invalid mac type %s", *av); 5180cc4d3c30SLuigi Rizzo av++; 5181e706181bSLuigi Rizzo break; 5182e706181bSLuigi Rizzo 5183010dabb0SCrist J. Clark case TOK_VERREVPATH: 5184010dabb0SCrist J. Clark fill_cmd(cmd, O_VERREVPATH, 0, 0); 5185010dabb0SCrist J. Clark break; 5186010dabb0SCrist J. Clark 518722b5770bSAndre Oppermann case TOK_VERSRCREACH: 518822b5770bSAndre Oppermann fill_cmd(cmd, O_VERSRCREACH, 0, 0); 518922b5770bSAndre Oppermann break; 519022b5770bSAndre Oppermann 51915f9541ecSAndre Oppermann case TOK_ANTISPOOF: 51925f9541ecSAndre Oppermann fill_cmd(cmd, O_ANTISPOOF, 0, 0); 51935f9541ecSAndre Oppermann break; 51945f9541ecSAndre Oppermann 5195c3e5b9f1SLuigi Rizzo case TOK_IPSEC: 5196c3e5b9f1SLuigi Rizzo fill_cmd(cmd, O_IPSEC, 0, 0); 5197c3e5b9f1SLuigi Rizzo break; 5198c3e5b9f1SLuigi Rizzo 51998195404bSBrooks Davis case TOK_IPV6: 52008195404bSBrooks Davis fill_cmd(cmd, O_IP6, 0, 0); 52018195404bSBrooks Davis break; 52028195404bSBrooks Davis 520357cd6d26SMax Laier case TOK_IPV4: 520457cd6d26SMax Laier fill_cmd(cmd, O_IP4, 0, 0); 520557cd6d26SMax Laier break; 520657cd6d26SMax Laier 52078195404bSBrooks Davis case TOK_EXT6HDR: 5208682c31dbSEvgeniy Khramtsov NEED1("missing extension header"); 52098195404bSBrooks Davis fill_ext6hdr( cmd, *av ); 5210cc4d3c30SLuigi Rizzo av++; 52118195404bSBrooks Davis break; 52128195404bSBrooks Davis 52138195404bSBrooks Davis case TOK_FLOWID: 52148195404bSBrooks Davis if (proto != IPPROTO_IPV6 ) 52158195404bSBrooks Davis errx( EX_USAGE, "flow-id filter is active " 52168195404bSBrooks Davis "only for ipv6 protocol\n"); 5217579ed7bdSAlexander V. Chernikov fill_flow6( (ipfw_insn_u32 *) cmd, *av, cblen); 5218cc4d3c30SLuigi Rizzo av++; 52198195404bSBrooks Davis break; 52208195404bSBrooks Davis 522162ff38aeSLuigi Rizzo case TOK_COMMENT: 5222579ed7bdSAlexander V. Chernikov fill_comment(cmd, av, cblen); 5223cc4d3c30SLuigi Rizzo av[0]=NULL; 522462ff38aeSLuigi Rizzo break; 522562ff38aeSLuigi Rizzo 52266a7d5cb6SOleg Bulyzhin case TOK_TAGGED: 5227cc4d3c30SLuigi Rizzo if (av[0] && strpbrk(*av, "-,")) { 5228579ed7bdSAlexander V. Chernikov if (!add_ports(cmd, *av, 0, O_TAGGED, cblen)) 5229254c4725SOleg Bulyzhin errx(EX_DATAERR, "tagged: invalid tag" 5230254c4725SOleg Bulyzhin " list: %s", *av); 5231254c4725SOleg Bulyzhin } 5232254c4725SOleg Bulyzhin else { 5233254c4725SOleg Bulyzhin uint16_t tag; 5234254c4725SOleg Bulyzhin 5235b87ce554SLuigi Rizzo GET_UINT_ARG(tag, IPFW_ARG_MIN, IPFW_ARG_MAX, 5236759dd6f7SRoman Kurakin TOK_TAGGED, rule_options); 5237254c4725SOleg Bulyzhin fill_cmd(cmd, O_TAGGED, 0, tag); 52386a7d5cb6SOleg Bulyzhin } 5239cc4d3c30SLuigi Rizzo av++; 52406a7d5cb6SOleg Bulyzhin break; 52416a7d5cb6SOleg Bulyzhin 52428b07e49aSJulian Elischer case TOK_FIB: 52438b07e49aSJulian Elischer NEED1("fib requires fib number"); 52448b07e49aSJulian Elischer fill_cmd(cmd, O_FIB, 0, strtoul(*av, NULL, 0)); 5245cc4d3c30SLuigi Rizzo av++; 52468b07e49aSJulian Elischer break; 5247ae99fd0eSLuigi Rizzo case TOK_SOCKARG: 5248ae99fd0eSLuigi Rizzo fill_cmd(cmd, O_SOCKARG, 0, 0); 5249ae99fd0eSLuigi Rizzo break; 52508b07e49aSJulian Elischer 5251472099c4SLuigi Rizzo case TOK_LOOKUP: { 5252472099c4SLuigi Rizzo ipfw_insn_u32 *c = (ipfw_insn_u32 *)cmd; 5253472099c4SLuigi Rizzo 525472662a75SLuigi Rizzo if (!av[0] || !av[1]) 5255472099c4SLuigi Rizzo errx(EX_USAGE, "format: lookup argument tablenum"); 5256472099c4SLuigi Rizzo cmd->opcode = O_IP_DST_LOOKUP; 5257472099c4SLuigi Rizzo cmd->len |= F_INSN_SIZE(ipfw_insn) + 2; 525881cac390SArseny Smalyuk i = match_token(lookup_keys, *av); 525981cac390SArseny Smalyuk if (i == -1) 5260472099c4SLuigi Rizzo errx(EX_USAGE, "format: cannot lookup on %s", *av); 526181cac390SArseny Smalyuk __PAST_END(c->d, 1) = i; 5262cc4d3c30SLuigi Rizzo av++; 5263b23d5de9SAlexander V. Chernikov 526481cac390SArseny Smalyuk if ((i = pack_table(tstate, *av)) == 0) 5265b23d5de9SAlexander V. Chernikov errx(EX_DATAERR, "Invalid table name: %s", *av); 5266b23d5de9SAlexander V. Chernikov 526781cac390SArseny Smalyuk cmd->arg1 = i; 5268cc4d3c30SLuigi Rizzo av++; 5269472099c4SLuigi Rizzo } 5270472099c4SLuigi Rizzo break; 5271914bffb6SAlexander V. Chernikov case TOK_FLOW: 5272914bffb6SAlexander V. Chernikov NEED1("missing table name"); 5273914bffb6SAlexander V. Chernikov if (strncmp(*av, "table(", 6) != 0) 5274914bffb6SAlexander V. Chernikov errx(EX_DATAERR, 5275914bffb6SAlexander V. Chernikov "enclose table name into \"table()\""); 5276914bffb6SAlexander V. Chernikov fill_table(cmd, *av, O_IP_FLOW_LOOKUP, tstate); 5277914bffb6SAlexander V. Chernikov av++; 5278914bffb6SAlexander V. Chernikov break; 5279472099c4SLuigi Rizzo 5280f7c4fdeeSAndrey V. Elsukov case TOK_SKIPACTION: 5281f7c4fdeeSAndrey V. Elsukov if (have_skipcmd) 5282f7c4fdeeSAndrey V. Elsukov errx(EX_USAGE, "only one defer-action " 5283f7c4fdeeSAndrey V. Elsukov "is allowed"); 5284f7c4fdeeSAndrey V. Elsukov have_skipcmd = cmd; 5285f7c4fdeeSAndrey V. Elsukov fill_cmd(cmd, O_SKIP_ACTION, 0, 0); 5286f7c4fdeeSAndrey V. Elsukov break; 5287f7c4fdeeSAndrey V. Elsukov 5288fc727ad6SBoris Lytochkin case TOK_MARK: 5289fc727ad6SBoris Lytochkin NEED1("missing mark value:mask"); 5290fc727ad6SBoris Lytochkin fill_mark(cmd, *av, cblen); 5291fc727ad6SBoris Lytochkin av++; 5292fc727ad6SBoris Lytochkin break; 5293fc727ad6SBoris Lytochkin 52949758b77fSLuigi Rizzo default: 52959758b77fSLuigi Rizzo errx(EX_USAGE, "unrecognised option [%d] %s\n", i, s); 52969758b77fSLuigi Rizzo } 52979758b77fSLuigi Rizzo if (F_LEN(cmd) > 0) { /* prepare to advance */ 52989758b77fSLuigi Rizzo prev = cmd; 5299579ed7bdSAlexander V. Chernikov cmd = next_cmd(cmd, &cblen); 53009758b77fSLuigi Rizzo } 53019758b77fSLuigi Rizzo } 53029758b77fSLuigi Rizzo 53039758b77fSLuigi Rizzo done: 5304f7c4fdeeSAndrey V. Elsukov 5305f7c4fdeeSAndrey V. Elsukov if (!have_state && have_skipcmd) 5306f7c4fdeeSAndrey V. Elsukov warnx("Rule contains \"defer-immediate-action\" " 5307f7c4fdeeSAndrey V. Elsukov "and doesn't contain any state-related options."); 5308f7c4fdeeSAndrey V. Elsukov 53099758b77fSLuigi Rizzo /* 53109758b77fSLuigi Rizzo * Now copy stuff into the rule. 53119758b77fSLuigi Rizzo * If we have a keep-state option, the first instruction 53129758b77fSLuigi Rizzo * must be a PROBE_STATE (which is generated here). 53139758b77fSLuigi Rizzo * If we have a LOG option, it was stored as the first command, 53149758b77fSLuigi Rizzo * and now must be moved to the top of the action part. 53159758b77fSLuigi Rizzo */ 53169758b77fSLuigi Rizzo dst = (ipfw_insn *)rule->cmd; 53179758b77fSLuigi Rizzo 53189758b77fSLuigi Rizzo /* 531912b5dc6aSLuigi Rizzo * First thing to write into the command stream is the match probability. 532012b5dc6aSLuigi Rizzo */ 532112b5dc6aSLuigi Rizzo if (match_prob != 1) { /* 1 means always match */ 532212b5dc6aSLuigi Rizzo dst->opcode = O_PROB; 532312b5dc6aSLuigi Rizzo dst->len = 2; 532412b5dc6aSLuigi Rizzo *((int32_t *)(dst+1)) = (int32_t)(match_prob * 0x7fffffff); 532512b5dc6aSLuigi Rizzo dst += dst->len; 532612b5dc6aSLuigi Rizzo } 532712b5dc6aSLuigi Rizzo 532812b5dc6aSLuigi Rizzo /* 53299758b77fSLuigi Rizzo * generate O_PROBE_STATE if necessary 53309758b77fSLuigi Rizzo */ 5331f7c4fdeeSAndrey V. Elsukov if (have_state && have_state->opcode != O_CHECK_STATE && !have_rstate) { 5332ed22e564SAndrey V. Elsukov fill_cmd(dst, O_PROBE_STATE, 0, have_state->arg1); 5333579ed7bdSAlexander V. Chernikov dst = next_cmd(dst, &rblen); 53349758b77fSLuigi Rizzo } 53356a7d5cb6SOleg Bulyzhin 5336f7c4fdeeSAndrey V. Elsukov /* 5337f7c4fdeeSAndrey V. Elsukov * copy all commands but O_LOG, O_KEEP_STATE, O_LIMIT, O_ALTQ, O_TAG, 5338f7c4fdeeSAndrey V. Elsukov * O_SKIP_ACTION 5339f7c4fdeeSAndrey V. Elsukov */ 53409758b77fSLuigi Rizzo for (src = (ipfw_insn *)cmdbuf; src != cmd; src += i) { 53419758b77fSLuigi Rizzo i = F_LEN(src); 5342579ed7bdSAlexander V. Chernikov CHECK_RBUFLEN(i); 53439758b77fSLuigi Rizzo 534452bc23abSLuigi Rizzo switch (src->opcode) { 534552bc23abSLuigi Rizzo case O_LOG: 534652bc23abSLuigi Rizzo case O_KEEP_STATE: 534752bc23abSLuigi Rizzo case O_LIMIT: 5348974dfe30SBrian Feldman case O_ALTQ: 53496a7d5cb6SOleg Bulyzhin case O_TAG: 5350f7c4fdeeSAndrey V. Elsukov case O_SKIP_ACTION: 535152bc23abSLuigi Rizzo break; 535252bc23abSLuigi Rizzo default: 5353571f8c1bSLuigi Rizzo bcopy(src, dst, i * sizeof(uint32_t)); 53549758b77fSLuigi Rizzo dst += i; 53559758b77fSLuigi Rizzo } 53569758b77fSLuigi Rizzo } 53579758b77fSLuigi Rizzo 53589758b77fSLuigi Rizzo /* 535952bc23abSLuigi Rizzo * put back the have_state command as last opcode 536052bc23abSLuigi Rizzo */ 5361b985a624SLuigi Rizzo if (have_state && have_state->opcode != O_CHECK_STATE) { 536252bc23abSLuigi Rizzo i = F_LEN(have_state); 5363579ed7bdSAlexander V. Chernikov CHECK_RBUFLEN(i); 5364571f8c1bSLuigi Rizzo bcopy(have_state, dst, i * sizeof(uint32_t)); 536552bc23abSLuigi Rizzo dst += i; 536652bc23abSLuigi Rizzo } 5367f7c4fdeeSAndrey V. Elsukov 5368f7c4fdeeSAndrey V. Elsukov /* 5369f7c4fdeeSAndrey V. Elsukov * put back the have_skipcmd command as very last opcode 5370f7c4fdeeSAndrey V. Elsukov */ 5371f7c4fdeeSAndrey V. Elsukov if (have_skipcmd) { 5372f7c4fdeeSAndrey V. Elsukov i = F_LEN(have_skipcmd); 5373f7c4fdeeSAndrey V. Elsukov CHECK_RBUFLEN(i); 5374f7c4fdeeSAndrey V. Elsukov bcopy(have_skipcmd, dst, i * sizeof(uint32_t)); 5375f7c4fdeeSAndrey V. Elsukov dst += i; 5376f7c4fdeeSAndrey V. Elsukov } 5377f7c4fdeeSAndrey V. Elsukov 537852bc23abSLuigi Rizzo /* 53799758b77fSLuigi Rizzo * start action section 53809758b77fSLuigi Rizzo */ 53819758b77fSLuigi Rizzo rule->act_ofs = dst - rule->cmd; 53829758b77fSLuigi Rizzo 53836a7d5cb6SOleg Bulyzhin /* put back O_LOG, O_ALTQ, O_TAG if necessary */ 5384974dfe30SBrian Feldman if (have_log) { 5385974dfe30SBrian Feldman i = F_LEN(have_log); 5386579ed7bdSAlexander V. Chernikov CHECK_RBUFLEN(i); 5387974dfe30SBrian Feldman bcopy(have_log, dst, i * sizeof(uint32_t)); 5388974dfe30SBrian Feldman dst += i; 5389974dfe30SBrian Feldman } 5390974dfe30SBrian Feldman if (have_altq) { 5391974dfe30SBrian Feldman i = F_LEN(have_altq); 5392579ed7bdSAlexander V. Chernikov CHECK_RBUFLEN(i); 5393974dfe30SBrian Feldman bcopy(have_altq, dst, i * sizeof(uint32_t)); 53949758b77fSLuigi Rizzo dst += i; 53959758b77fSLuigi Rizzo } 53966a7d5cb6SOleg Bulyzhin if (have_tag) { 53976a7d5cb6SOleg Bulyzhin i = F_LEN(have_tag); 5398579ed7bdSAlexander V. Chernikov CHECK_RBUFLEN(i); 53996a7d5cb6SOleg Bulyzhin bcopy(have_tag, dst, i * sizeof(uint32_t)); 54006a7d5cb6SOleg Bulyzhin dst += i; 54016a7d5cb6SOleg Bulyzhin } 5402579ed7bdSAlexander V. Chernikov 54039758b77fSLuigi Rizzo /* 54049758b77fSLuigi Rizzo * copy all other actions 54059758b77fSLuigi Rizzo */ 54069758b77fSLuigi Rizzo for (src = (ipfw_insn *)actbuf; src != action; src += i) { 54079758b77fSLuigi Rizzo i = F_LEN(src); 5408579ed7bdSAlexander V. Chernikov CHECK_RBUFLEN(i); 5409571f8c1bSLuigi Rizzo bcopy(src, dst, i * sizeof(uint32_t)); 54109758b77fSLuigi Rizzo dst += i; 54119758b77fSLuigi Rizzo } 54129758b77fSLuigi Rizzo 5413571f8c1bSLuigi Rizzo rule->cmd_len = (uint32_t *)dst - (uint32_t *)(rule->cmd); 54146c2997ffSAlexander V. Chernikov *rbufsize = (char *)dst - (char *)rule; 54156c2997ffSAlexander V. Chernikov } 54166c2997ffSAlexander V. Chernikov 54178963c505SAlexander V. Chernikov static int 54188963c505SAlexander V. Chernikov compare_ntlv(const void *_a, const void *_b) 54198963c505SAlexander V. Chernikov { 542056707beeSMark Johnston const ipfw_obj_ntlv *a, *b; 54218963c505SAlexander V. Chernikov 542256707beeSMark Johnston a = (const ipfw_obj_ntlv *)_a; 542356707beeSMark Johnston b = (const ipfw_obj_ntlv *)_b; 54248963c505SAlexander V. Chernikov 54258963c505SAlexander V. Chernikov if (a->set < b->set) 54268963c505SAlexander V. Chernikov return (-1); 54278963c505SAlexander V. Chernikov else if (a->set > b->set) 54288963c505SAlexander V. Chernikov return (1); 54298963c505SAlexander V. Chernikov 54308963c505SAlexander V. Chernikov if (a->idx < b->idx) 54318963c505SAlexander V. Chernikov return (-1); 54328963c505SAlexander V. Chernikov else if (a->idx > b->idx) 54338963c505SAlexander V. Chernikov return (1); 54348963c505SAlexander V. Chernikov 54358963c505SAlexander V. Chernikov if (a->head.type < b->head.type) 54368963c505SAlexander V. Chernikov return (-1); 54378963c505SAlexander V. Chernikov else if (a->head.type > b->head.type) 54388963c505SAlexander V. Chernikov return (1); 54398963c505SAlexander V. Chernikov 54408963c505SAlexander V. Chernikov return (0); 54418963c505SAlexander V. Chernikov } 54428963c505SAlexander V. Chernikov 54438963c505SAlexander V. Chernikov /* 54448963c505SAlexander V. Chernikov * Provide kernel with sorted list of referenced objects 54458963c505SAlexander V. Chernikov */ 54468963c505SAlexander V. Chernikov static void 54478963c505SAlexander V. Chernikov object_sort_ctlv(ipfw_obj_ctlv *ctlv) 54488963c505SAlexander V. Chernikov { 54498963c505SAlexander V. Chernikov 54508963c505SAlexander V. Chernikov qsort(ctlv + 1, ctlv->count, ctlv->objsize, compare_ntlv); 54518963c505SAlexander V. Chernikov } 54528963c505SAlexander V. Chernikov 54538963c505SAlexander V. Chernikov struct object_kt { 54548963c505SAlexander V. Chernikov uint16_t uidx; 54558963c505SAlexander V. Chernikov uint16_t type; 54568963c505SAlexander V. Chernikov }; 54578963c505SAlexander V. Chernikov static int 54588963c505SAlexander V. Chernikov compare_object_kntlv(const void *k, const void *v) 54598963c505SAlexander V. Chernikov { 546056707beeSMark Johnston const ipfw_obj_ntlv *ntlv; 54618963c505SAlexander V. Chernikov struct object_kt key; 54628963c505SAlexander V. Chernikov 546356707beeSMark Johnston key = *((const struct object_kt *)k); 546456707beeSMark Johnston ntlv = (const ipfw_obj_ntlv *)v; 54658963c505SAlexander V. Chernikov 54668963c505SAlexander V. Chernikov if (key.uidx < ntlv->idx) 54678963c505SAlexander V. Chernikov return (-1); 54688963c505SAlexander V. Chernikov else if (key.uidx > ntlv->idx) 54698963c505SAlexander V. Chernikov return (1); 54708963c505SAlexander V. Chernikov 54718963c505SAlexander V. Chernikov if (key.type < ntlv->head.type) 54728963c505SAlexander V. Chernikov return (-1); 54738963c505SAlexander V. Chernikov else if (key.type > ntlv->head.type) 54748963c505SAlexander V. Chernikov return (1); 54758963c505SAlexander V. Chernikov 54768963c505SAlexander V. Chernikov return (0); 54778963c505SAlexander V. Chernikov } 54788963c505SAlexander V. Chernikov 54798963c505SAlexander V. Chernikov /* 54808963c505SAlexander V. Chernikov * Finds object name in @ctlv by @idx and @type. 54818963c505SAlexander V. Chernikov * Uses the following facts: 54828963c505SAlexander V. Chernikov * 1) All TLVs are the same size 54838963c505SAlexander V. Chernikov * 2) Kernel implementation provides already sorted list. 54848963c505SAlexander V. Chernikov * 54858963c505SAlexander V. Chernikov * Returns table name or NULL. 54868963c505SAlexander V. Chernikov */ 54878963c505SAlexander V. Chernikov static char * 54888963c505SAlexander V. Chernikov object_search_ctlv(ipfw_obj_ctlv *ctlv, uint16_t idx, uint16_t type) 54898963c505SAlexander V. Chernikov { 54908963c505SAlexander V. Chernikov ipfw_obj_ntlv *ntlv; 54918963c505SAlexander V. Chernikov struct object_kt key; 54928963c505SAlexander V. Chernikov 54938963c505SAlexander V. Chernikov key.uidx = idx; 54948963c505SAlexander V. Chernikov key.type = type; 54958963c505SAlexander V. Chernikov 54968963c505SAlexander V. Chernikov ntlv = bsearch(&key, (ctlv + 1), ctlv->count, ctlv->objsize, 54978963c505SAlexander V. Chernikov compare_object_kntlv); 54988963c505SAlexander V. Chernikov 54992acdf79fSAndrey V. Elsukov if (ntlv != NULL) 55008963c505SAlexander V. Chernikov return (ntlv->name); 55018963c505SAlexander V. Chernikov 55028963c505SAlexander V. Chernikov return (NULL); 55038963c505SAlexander V. Chernikov } 55048963c505SAlexander V. Chernikov 55058963c505SAlexander V. Chernikov static char * 55068963c505SAlexander V. Chernikov table_search_ctlv(ipfw_obj_ctlv *ctlv, uint16_t idx) 55078963c505SAlexander V. Chernikov { 55088963c505SAlexander V. Chernikov 55098963c505SAlexander V. Chernikov return (object_search_ctlv(ctlv, idx, IPFW_TLV_TBL_NAME)); 55108963c505SAlexander V. Chernikov } 55118963c505SAlexander V. Chernikov 55126c2997ffSAlexander V. Chernikov /* 55136c2997ffSAlexander V. Chernikov * Adds one or more rules to ipfw chain. 55146c2997ffSAlexander V. Chernikov * Data layout: 55156c2997ffSAlexander V. Chernikov * Request: 55166c2997ffSAlexander V. Chernikov * [ 55176c2997ffSAlexander V. Chernikov * ip_fw3_opheader 55186c2997ffSAlexander V. Chernikov * [ ipfw_obj_ctlv(IPFW_TLV_TBL_LIST) ipfw_obj_ntlv x N ] (optional *1) 55197e767c79SAlexander V. Chernikov * [ ipfw_obj_ctlv(IPFW_TLV_RULE_LIST) [ ip_fw_rule ip_fw_insn ] x N ] (*2) (*3) 55206c2997ffSAlexander V. Chernikov * ] 55216c2997ffSAlexander V. Chernikov * Reply: 55226c2997ffSAlexander V. Chernikov * [ 55236c2997ffSAlexander V. Chernikov * ip_fw3_opheader 55246c2997ffSAlexander V. Chernikov * [ ipfw_obj_ctlv(IPFW_TLV_TBL_LIST) ipfw_obj_ntlv x N ] (optional) 55257e767c79SAlexander V. Chernikov * [ ipfw_obj_ctlv(IPFW_TLV_RULE_LIST) [ ip_fw_rule ip_fw_insn ] x N ] 55266c2997ffSAlexander V. Chernikov * ] 55276c2997ffSAlexander V. Chernikov * 55286c2997ffSAlexander V. Chernikov * Rules in reply are modified to store their actual ruleset number. 55296c2997ffSAlexander V. Chernikov * 55306c2997ffSAlexander V. Chernikov * (*1) TLVs inside IPFW_TLV_TBL_LIST needs to be sorted ascending 5531b68ac800SPedro F. Giffuni * according to their idx field and there has to be no duplicates. 55326c2997ffSAlexander V. Chernikov * (*2) Numbered rules inside IPFW_TLV_RULE_LIST needs to be sorted ascending. 55336c2997ffSAlexander V. Chernikov * (*3) Each ip_fw structure needs to be aligned to u64 boundary. 55346c2997ffSAlexander V. Chernikov */ 55356c2997ffSAlexander V. Chernikov void 55366c2997ffSAlexander V. Chernikov ipfw_add(char *av[]) 55376c2997ffSAlexander V. Chernikov { 55386c2997ffSAlexander V. Chernikov uint32_t rulebuf[1024]; 55396c2997ffSAlexander V. Chernikov int rbufsize, default_off, tlen, rlen; 55406c2997ffSAlexander V. Chernikov size_t sz; 55416c2997ffSAlexander V. Chernikov struct tidx ts; 55427e767c79SAlexander V. Chernikov struct ip_fw_rule *rule; 55436c2997ffSAlexander V. Chernikov caddr_t tbuf; 55446c2997ffSAlexander V. Chernikov ip_fw3_opheader *op3; 55456c2997ffSAlexander V. Chernikov ipfw_obj_ctlv *ctlv, *tstate; 55466c2997ffSAlexander V. Chernikov 55476c2997ffSAlexander V. Chernikov rbufsize = sizeof(rulebuf); 55486ff33bb6SAlexander V. Chernikov memset(rulebuf, 0, rbufsize); 55496c2997ffSAlexander V. Chernikov memset(&ts, 0, sizeof(ts)); 55506c2997ffSAlexander V. Chernikov 55516c2997ffSAlexander V. Chernikov /* Optimize case with no tables */ 55526c2997ffSAlexander V. Chernikov default_off = sizeof(ipfw_obj_ctlv) + sizeof(ip_fw3_opheader); 55536c2997ffSAlexander V. Chernikov op3 = (ip_fw3_opheader *)rulebuf; 55546c2997ffSAlexander V. Chernikov ctlv = (ipfw_obj_ctlv *)(op3 + 1); 55557e767c79SAlexander V. Chernikov rule = (struct ip_fw_rule *)(ctlv + 1); 55566c2997ffSAlexander V. Chernikov rbufsize -= default_off; 55576c2997ffSAlexander V. Chernikov 55586c2997ffSAlexander V. Chernikov compile_rule(av, (uint32_t *)rule, &rbufsize, &ts); 55596c2997ffSAlexander V. Chernikov /* Align rule size to u64 boundary */ 55606c2997ffSAlexander V. Chernikov rlen = roundup2(rbufsize, sizeof(uint64_t)); 55616c2997ffSAlexander V. Chernikov 55626c2997ffSAlexander V. Chernikov tbuf = NULL; 55636c2997ffSAlexander V. Chernikov sz = 0; 55646c2997ffSAlexander V. Chernikov tstate = NULL; 55656c2997ffSAlexander V. Chernikov if (ts.count != 0) { 55666c2997ffSAlexander V. Chernikov /* Some tables. We have to alloc more data */ 55676c2997ffSAlexander V. Chernikov tlen = ts.count * sizeof(ipfw_obj_ntlv); 55686c2997ffSAlexander V. Chernikov sz = default_off + sizeof(ipfw_obj_ctlv) + tlen + rlen; 55696c2997ffSAlexander V. Chernikov 55706c2997ffSAlexander V. Chernikov if ((tbuf = calloc(1, sz)) == NULL) 55716c2997ffSAlexander V. Chernikov err(EX_UNAVAILABLE, "malloc() failed for IP_FW_ADD"); 55726c2997ffSAlexander V. Chernikov op3 = (ip_fw3_opheader *)tbuf; 55736c2997ffSAlexander V. Chernikov /* Tables first */ 55746c2997ffSAlexander V. Chernikov ctlv = (ipfw_obj_ctlv *)(op3 + 1); 55756c2997ffSAlexander V. Chernikov ctlv->head.type = IPFW_TLV_TBLNAME_LIST; 55766c2997ffSAlexander V. Chernikov ctlv->head.length = sizeof(ipfw_obj_ctlv) + tlen; 55776c2997ffSAlexander V. Chernikov ctlv->count = ts.count; 55786c2997ffSAlexander V. Chernikov ctlv->objsize = sizeof(ipfw_obj_ntlv); 55796c2997ffSAlexander V. Chernikov memcpy(ctlv + 1, ts.idx, tlen); 55808963c505SAlexander V. Chernikov object_sort_ctlv(ctlv); 55816c2997ffSAlexander V. Chernikov tstate = ctlv; 55826c2997ffSAlexander V. Chernikov /* Rule next */ 55836c2997ffSAlexander V. Chernikov ctlv = (ipfw_obj_ctlv *)((caddr_t)ctlv + ctlv->head.length); 55846c2997ffSAlexander V. Chernikov ctlv->head.type = IPFW_TLV_RULE_LIST; 55856c2997ffSAlexander V. Chernikov ctlv->head.length = sizeof(ipfw_obj_ctlv) + rlen; 55866c2997ffSAlexander V. Chernikov ctlv->count = 1; 55876c2997ffSAlexander V. Chernikov memcpy(ctlv + 1, rule, rbufsize); 55886c2997ffSAlexander V. Chernikov } else { 55896c2997ffSAlexander V. Chernikov /* Simply add header */ 55906c2997ffSAlexander V. Chernikov sz = rlen + default_off; 55916c2997ffSAlexander V. Chernikov memset(ctlv, 0, sizeof(*ctlv)); 55926c2997ffSAlexander V. Chernikov ctlv->head.type = IPFW_TLV_RULE_LIST; 55936c2997ffSAlexander V. Chernikov ctlv->head.length = sizeof(ipfw_obj_ctlv) + rlen; 55946c2997ffSAlexander V. Chernikov ctlv->count = 1; 55956c2997ffSAlexander V. Chernikov } 55966c2997ffSAlexander V. Chernikov 55976c2997ffSAlexander V. Chernikov if (do_get3(IP_FW_XADD, op3, &sz) != 0) 55986c2997ffSAlexander V. Chernikov err(EX_UNAVAILABLE, "getsockopt(%s)", "IP_FW_XADD"); 55996c2997ffSAlexander V. Chernikov 560056707beeSMark Johnston if (!g_co.do_quiet) { 5601563b5ab1SAlexander V. Chernikov struct format_opts sfo; 5602563b5ab1SAlexander V. Chernikov struct buf_pr bp; 5603563b5ab1SAlexander V. Chernikov memset(&sfo, 0, sizeof(sfo)); 56046c2997ffSAlexander V. Chernikov sfo.tstate = tstate; 56057e767c79SAlexander V. Chernikov sfo.set_mask = (uint32_t)(-1); 5606563b5ab1SAlexander V. Chernikov bp_alloc(&bp, 4096); 560756707beeSMark Johnston show_static_rule(&g_co, &sfo, &bp, rule, NULL); 56084df4dadaSAlexander V. Chernikov printf("%s", bp.buf); 5609563b5ab1SAlexander V. Chernikov bp_free(&bp); 5610563b5ab1SAlexander V. Chernikov } 56116c2997ffSAlexander V. Chernikov 56126c2997ffSAlexander V. Chernikov if (tbuf != NULL) 56136c2997ffSAlexander V. Chernikov free(tbuf); 56146c2997ffSAlexander V. Chernikov 56156c2997ffSAlexander V. Chernikov if (ts.idx != NULL) 56166c2997ffSAlexander V. Chernikov free(ts.idx); 56179758b77fSLuigi Rizzo } 56189758b77fSLuigi Rizzo 56193c0c8717SLuigi Rizzo /* 56203c0c8717SLuigi Rizzo * clear the counters or the log counters. 5621a73d728dSAlexander V. Chernikov * optname has the following values: 5622a73d728dSAlexander V. Chernikov * 0 (zero both counters and logging) 5623a73d728dSAlexander V. Chernikov * 1 (zero logging only) 56243c0c8717SLuigi Rizzo */ 56253c0c8717SLuigi Rizzo void 5626a73d728dSAlexander V. Chernikov ipfw_zero(int ac, char *av[], int optname) 56279758b77fSLuigi Rizzo { 5628a73d728dSAlexander V. Chernikov ipfw_range_tlv rt; 5629d069a5d4SMaxim Konovalov char const *errstr; 56303c0c8717SLuigi Rizzo char const *name = optname ? "RESETLOG" : "ZERO"; 5631df5be97cSAndrey V. Elsukov uint32_t arg; 5632df5be97cSAndrey V. Elsukov int failed = EX_OK; 56333c0c8717SLuigi Rizzo 5634a73d728dSAlexander V. Chernikov optname = optname ? IP_FW_XRESETLOG : IP_FW_XZERO; 56359758b77fSLuigi Rizzo av++; ac--; 56369758b77fSLuigi Rizzo 5637a73d728dSAlexander V. Chernikov if (ac == 0) { 56389758b77fSLuigi Rizzo /* clear all entries */ 5639df5be97cSAndrey V. Elsukov memset(&rt, 0, sizeof(rt)); 5640a73d728dSAlexander V. Chernikov rt.flags = IPFW_RCFLAG_ALL; 5641a73d728dSAlexander V. Chernikov if (do_range_cmd(optname, &rt) < 0) 5642a73d728dSAlexander V. Chernikov err(EX_UNAVAILABLE, "setsockopt(IP_FW_X%s)", name); 564356707beeSMark Johnston if (!g_co.do_quiet) 5644a73d728dSAlexander V. Chernikov printf("%s.\n", optname == IP_FW_XZERO ? 5645571f8c1bSLuigi Rizzo "Accounting cleared":"Logging counts reset"); 56469758b77fSLuigi Rizzo 56479758b77fSLuigi Rizzo return; 56489758b77fSLuigi Rizzo } 56499758b77fSLuigi Rizzo 56509758b77fSLuigi Rizzo while (ac) { 56519758b77fSLuigi Rizzo /* Rule number */ 56529758b77fSLuigi Rizzo if (isdigit(**av)) { 5653d069a5d4SMaxim Konovalov arg = strtonum(*av, 0, 0xffff, &errstr); 5654d069a5d4SMaxim Konovalov if (errstr) 5655d069a5d4SMaxim Konovalov errx(EX_DATAERR, 5656d069a5d4SMaxim Konovalov "invalid rule number %s\n", *av); 5657df5be97cSAndrey V. Elsukov memset(&rt, 0, sizeof(rt)); 5658a73d728dSAlexander V. Chernikov rt.start_rule = arg; 5659a73d728dSAlexander V. Chernikov rt.end_rule = arg; 5660a73d728dSAlexander V. Chernikov rt.flags |= IPFW_RCFLAG_RANGE; 566156707beeSMark Johnston if (g_co.use_set != 0) { 566256707beeSMark Johnston rt.set = g_co.use_set - 1; 5663a73d728dSAlexander V. Chernikov rt.flags |= IPFW_RCFLAG_SET; 5664a73d728dSAlexander V. Chernikov } 5665a73d728dSAlexander V. Chernikov if (do_range_cmd(optname, &rt) != 0) { 5666a73d728dSAlexander V. Chernikov warn("rule %u: setsockopt(IP_FW_X%s)", 5667a73d728dSAlexander V. Chernikov arg, name); 56689758b77fSLuigi Rizzo failed = EX_UNAVAILABLE; 566960f485caSAlexander V. Chernikov } else if (rt.new_set == 0) { 567060f485caSAlexander V. Chernikov printf("Entry %d not found\n", arg); 567160f485caSAlexander V. Chernikov failed = EX_UNAVAILABLE; 567256707beeSMark Johnston } else if (!g_co.do_quiet) 5673a73d728dSAlexander V. Chernikov printf("Entry %d %s.\n", arg, 5674a73d728dSAlexander V. Chernikov optname == IP_FW_XZERO ? 5675571f8c1bSLuigi Rizzo "cleared" : "logging count reset"); 56769758b77fSLuigi Rizzo } else { 56779758b77fSLuigi Rizzo errx(EX_USAGE, "invalid rule number ``%s''", *av); 56789758b77fSLuigi Rizzo } 567960f485caSAlexander V. Chernikov av++; ac--; 56809758b77fSLuigi Rizzo } 56819758b77fSLuigi Rizzo if (failed != EX_OK) 56829758b77fSLuigi Rizzo exit(failed); 56839758b77fSLuigi Rizzo } 56849758b77fSLuigi Rizzo 56853c0c8717SLuigi Rizzo void 56863c0c8717SLuigi Rizzo ipfw_flush(int force) 56879758b77fSLuigi Rizzo { 5688a73d728dSAlexander V. Chernikov ipfw_range_tlv rt; 56899758b77fSLuigi Rizzo 569056707beeSMark Johnston if (!force && !g_co.do_quiet) { /* need to ask user */ 56919758b77fSLuigi Rizzo int c; 56929758b77fSLuigi Rizzo 56939758b77fSLuigi Rizzo printf("Are you sure? [yn] "); 56949758b77fSLuigi Rizzo fflush(stdout); 56959758b77fSLuigi Rizzo do { 56969758b77fSLuigi Rizzo c = toupper(getc(stdin)); 56979758b77fSLuigi Rizzo while (c != '\n' && getc(stdin) != '\n') 56989758b77fSLuigi Rizzo if (feof(stdin)) 56999758b77fSLuigi Rizzo return; /* and do not flush */ 57009758b77fSLuigi Rizzo } while (c != 'Y' && c != 'N'); 57019758b77fSLuigi Rizzo printf("\n"); 57029758b77fSLuigi Rizzo if (c == 'N') /* user said no */ 57039758b77fSLuigi Rizzo return; 57049758b77fSLuigi Rizzo } 570556707beeSMark Johnston if (g_co.do_pipe) { 5706cc4d3c30SLuigi Rizzo dummynet_flush(); 5707cc4d3c30SLuigi Rizzo return; 5708cc4d3c30SLuigi Rizzo } 5709d069a5d4SMaxim Konovalov /* `ipfw set N flush` - is the same that `ipfw delete set N` */ 5710a73d728dSAlexander V. Chernikov memset(&rt, 0, sizeof(rt)); 571156707beeSMark Johnston if (g_co.use_set != 0) { 571256707beeSMark Johnston rt.set = g_co.use_set - 1; 5713a73d728dSAlexander V. Chernikov rt.flags = IPFW_RCFLAG_SET; 5714a73d728dSAlexander V. Chernikov } else 5715a73d728dSAlexander V. Chernikov rt.flags = IPFW_RCFLAG_ALL; 5716a73d728dSAlexander V. Chernikov if (do_range_cmd(IP_FW_XDEL, &rt) != 0) 5717a73d728dSAlexander V. Chernikov err(EX_UNAVAILABLE, "setsockopt(IP_FW_XDEL)"); 571856707beeSMark Johnston if (!g_co.do_quiet) 571956707beeSMark Johnston printf("Flushed all %s.\n", g_co.do_pipe ? "pipes" : "rules"); 57209758b77fSLuigi Rizzo } 57219758b77fSLuigi Rizzo 5722358b9d09SAlexander V. Chernikov static struct _s_x intcmds[] = { 5723358b9d09SAlexander V. Chernikov { "talist", TOK_TALIST }, 5724358b9d09SAlexander V. Chernikov { "iflist", TOK_IFLIST }, 57255dc5a0e0SAndrey V. Elsukov { "olist", TOK_OLIST }, 57260cba2b28SAlexander V. Chernikov { "vlist", TOK_VLIST }, 5727358b9d09SAlexander V. Chernikov { NULL, 0 } 5728358b9d09SAlexander V. Chernikov }; 5729358b9d09SAlexander V. Chernikov 5730825f02a9SAndrey V. Elsukov static struct _s_x otypes[] = { 5731825f02a9SAndrey V. Elsukov { "EACTION", IPFW_TLV_EACTION }, 5732ed22e564SAndrey V. Elsukov { "DYNSTATE", IPFW_TLV_STATE_NAME }, 5733825f02a9SAndrey V. Elsukov { NULL, 0 } 5734825f02a9SAndrey V. Elsukov }; 5735825f02a9SAndrey V. Elsukov 5736825f02a9SAndrey V. Elsukov static const char* 5737825f02a9SAndrey V. Elsukov lookup_eaction_name(ipfw_obj_ntlv *ntlv, int cnt, uint16_t type) 5738825f02a9SAndrey V. Elsukov { 5739825f02a9SAndrey V. Elsukov const char *name; 5740825f02a9SAndrey V. Elsukov int i; 5741825f02a9SAndrey V. Elsukov 5742825f02a9SAndrey V. Elsukov name = NULL; 5743825f02a9SAndrey V. Elsukov for (i = 0; i < cnt; i++) { 5744825f02a9SAndrey V. Elsukov if (ntlv[i].head.type != IPFW_TLV_EACTION) 5745825f02a9SAndrey V. Elsukov continue; 5746825f02a9SAndrey V. Elsukov if (IPFW_TLV_EACTION_NAME(ntlv[i].idx) != type) 5747825f02a9SAndrey V. Elsukov continue; 5748825f02a9SAndrey V. Elsukov name = ntlv[i].name; 5749825f02a9SAndrey V. Elsukov break; 5750825f02a9SAndrey V. Elsukov } 5751825f02a9SAndrey V. Elsukov return (name); 5752825f02a9SAndrey V. Elsukov } 5753825f02a9SAndrey V. Elsukov 57545dc5a0e0SAndrey V. Elsukov static void 575556707beeSMark Johnston ipfw_list_objects(int ac __unused, char *av[] __unused) 57565dc5a0e0SAndrey V. Elsukov { 57575dc5a0e0SAndrey V. Elsukov ipfw_obj_lheader req, *olh; 57585dc5a0e0SAndrey V. Elsukov ipfw_obj_ntlv *ntlv; 5759825f02a9SAndrey V. Elsukov const char *name; 57605dc5a0e0SAndrey V. Elsukov size_t sz; 576156707beeSMark Johnston uint32_t i; 57625dc5a0e0SAndrey V. Elsukov 57635dc5a0e0SAndrey V. Elsukov memset(&req, 0, sizeof(req)); 57645dc5a0e0SAndrey V. Elsukov sz = sizeof(req); 57655dc5a0e0SAndrey V. Elsukov if (do_get3(IP_FW_DUMP_SRVOBJECTS, &req.opheader, &sz) != 0) 57665dc5a0e0SAndrey V. Elsukov if (errno != ENOMEM) 57675dc5a0e0SAndrey V. Elsukov return; 57685dc5a0e0SAndrey V. Elsukov 57695dc5a0e0SAndrey V. Elsukov sz = req.size; 57705dc5a0e0SAndrey V. Elsukov if ((olh = calloc(1, sz)) == NULL) 57715dc5a0e0SAndrey V. Elsukov return; 57725dc5a0e0SAndrey V. Elsukov 57735dc5a0e0SAndrey V. Elsukov olh->size = sz; 57745dc5a0e0SAndrey V. Elsukov if (do_get3(IP_FW_DUMP_SRVOBJECTS, &olh->opheader, &sz) != 0) { 57755dc5a0e0SAndrey V. Elsukov free(olh); 57765dc5a0e0SAndrey V. Elsukov return; 57775dc5a0e0SAndrey V. Elsukov } 57785dc5a0e0SAndrey V. Elsukov 57795dc5a0e0SAndrey V. Elsukov if (olh->count > 0) 57805dc5a0e0SAndrey V. Elsukov printf("Objects list:\n"); 57815dc5a0e0SAndrey V. Elsukov else 57825dc5a0e0SAndrey V. Elsukov printf("There are no objects\n"); 57835dc5a0e0SAndrey V. Elsukov ntlv = (ipfw_obj_ntlv *)(olh + 1); 57845dc5a0e0SAndrey V. Elsukov for (i = 0; i < olh->count; i++) { 5785825f02a9SAndrey V. Elsukov name = match_value(otypes, ntlv->head.type); 5786825f02a9SAndrey V. Elsukov if (name == NULL) 5787825f02a9SAndrey V. Elsukov name = lookup_eaction_name( 5788825f02a9SAndrey V. Elsukov (ipfw_obj_ntlv *)(olh + 1), olh->count, 5789825f02a9SAndrey V. Elsukov ntlv->head.type); 5790825f02a9SAndrey V. Elsukov if (name == NULL) 5791825f02a9SAndrey V. Elsukov printf(" kidx: %4d\ttype: %10d\tname: %s\n", 5792825f02a9SAndrey V. Elsukov ntlv->idx, ntlv->head.type, ntlv->name); 5793825f02a9SAndrey V. Elsukov else 5794825f02a9SAndrey V. Elsukov printf(" kidx: %4d\ttype: %10s\tname: %s\n", 5795825f02a9SAndrey V. Elsukov ntlv->idx, name, ntlv->name); 57965dc5a0e0SAndrey V. Elsukov ntlv++; 57975dc5a0e0SAndrey V. Elsukov } 57985dc5a0e0SAndrey V. Elsukov free(olh); 57995dc5a0e0SAndrey V. Elsukov } 58005dc5a0e0SAndrey V. Elsukov 5801358b9d09SAlexander V. Chernikov void 5802358b9d09SAlexander V. Chernikov ipfw_internal_handler(int ac, char *av[]) 5803358b9d09SAlexander V. Chernikov { 5804358b9d09SAlexander V. Chernikov int tcmd; 5805358b9d09SAlexander V. Chernikov 5806358b9d09SAlexander V. Chernikov ac--; av++; 5807358b9d09SAlexander V. Chernikov NEED1("internal cmd required"); 5808358b9d09SAlexander V. Chernikov 5809358b9d09SAlexander V. Chernikov if ((tcmd = match_token(intcmds, *av)) == -1) 5810358b9d09SAlexander V. Chernikov errx(EX_USAGE, "invalid internal sub-cmd: %s", *av); 5811358b9d09SAlexander V. Chernikov 5812358b9d09SAlexander V. Chernikov switch (tcmd) { 5813358b9d09SAlexander V. Chernikov case TOK_IFLIST: 5814358b9d09SAlexander V. Chernikov ipfw_list_tifaces(); 5815358b9d09SAlexander V. Chernikov break; 5816358b9d09SAlexander V. Chernikov case TOK_TALIST: 5817358b9d09SAlexander V. Chernikov ipfw_list_ta(ac, av); 5818358b9d09SAlexander V. Chernikov break; 58195dc5a0e0SAndrey V. Elsukov case TOK_OLIST: 58205dc5a0e0SAndrey V. Elsukov ipfw_list_objects(ac, av); 58215dc5a0e0SAndrey V. Elsukov break; 58220cba2b28SAlexander V. Chernikov case TOK_VLIST: 58230cba2b28SAlexander V. Chernikov ipfw_list_values(ac, av); 58240cba2b28SAlexander V. Chernikov break; 5825358b9d09SAlexander V. Chernikov } 5826358b9d09SAlexander V. Chernikov } 5827358b9d09SAlexander V. Chernikov 5828358b9d09SAlexander V. Chernikov static int 582968394ec8SAlexander V. Chernikov ipfw_get_tracked_ifaces(ipfw_obj_lheader **polh) 583068394ec8SAlexander V. Chernikov { 583168394ec8SAlexander V. Chernikov ipfw_obj_lheader req, *olh; 583268394ec8SAlexander V. Chernikov size_t sz; 583368394ec8SAlexander V. Chernikov 583468394ec8SAlexander V. Chernikov memset(&req, 0, sizeof(req)); 583568394ec8SAlexander V. Chernikov sz = sizeof(req); 583668394ec8SAlexander V. Chernikov 58374deb9c92SAlexander V. Chernikov if (do_get3(IP_FW_XIFLIST, &req.opheader, &sz) != 0) { 5838b6462881SAlexander V. Chernikov if (errno != ENOMEM) 5839b6462881SAlexander V. Chernikov return (errno); 5840b6462881SAlexander V. Chernikov } 584168394ec8SAlexander V. Chernikov 584268394ec8SAlexander V. Chernikov sz = req.size; 584368394ec8SAlexander V. Chernikov if ((olh = calloc(1, sz)) == NULL) 584468394ec8SAlexander V. Chernikov return (ENOMEM); 584568394ec8SAlexander V. Chernikov 584668394ec8SAlexander V. Chernikov olh->size = sz; 5847b6462881SAlexander V. Chernikov if (do_get3(IP_FW_XIFLIST, &olh->opheader, &sz) != 0) { 584868394ec8SAlexander V. Chernikov free(olh); 5849b6462881SAlexander V. Chernikov return (errno); 585068394ec8SAlexander V. Chernikov } 585168394ec8SAlexander V. Chernikov 585268394ec8SAlexander V. Chernikov *polh = olh; 585368394ec8SAlexander V. Chernikov return (0); 585468394ec8SAlexander V. Chernikov } 585568394ec8SAlexander V. Chernikov 585668394ec8SAlexander V. Chernikov static int 585768394ec8SAlexander V. Chernikov ifinfo_cmp(const void *a, const void *b) 585868394ec8SAlexander V. Chernikov { 585956707beeSMark Johnston const ipfw_iface_info *ia, *ib; 586068394ec8SAlexander V. Chernikov 586156707beeSMark Johnston ia = (const ipfw_iface_info *)a; 586256707beeSMark Johnston ib = (const ipfw_iface_info *)b; 586368394ec8SAlexander V. Chernikov 586468394ec8SAlexander V. Chernikov return (stringnum_cmp(ia->ifname, ib->ifname)); 586568394ec8SAlexander V. Chernikov } 586668394ec8SAlexander V. Chernikov 586768394ec8SAlexander V. Chernikov /* 586868394ec8SAlexander V. Chernikov * Retrieves table list from kernel, 586968394ec8SAlexander V. Chernikov * optionally sorts it and calls requested function for each table. 587068394ec8SAlexander V. Chernikov * Returns 0 on success. 587168394ec8SAlexander V. Chernikov */ 5872358b9d09SAlexander V. Chernikov static void 587356707beeSMark Johnston ipfw_list_tifaces(void) 587468394ec8SAlexander V. Chernikov { 5875268a20a0SAdrian Chadd ipfw_obj_lheader *olh = NULL; 587668394ec8SAlexander V. Chernikov ipfw_iface_info *info; 587756707beeSMark Johnston uint32_t i; 587856707beeSMark Johnston int error; 587968394ec8SAlexander V. Chernikov 588068394ec8SAlexander V. Chernikov if ((error = ipfw_get_tracked_ifaces(&olh)) != 0) 588168394ec8SAlexander V. Chernikov err(EX_OSERR, "Unable to request ipfw tracked interface list"); 588268394ec8SAlexander V. Chernikov 588368394ec8SAlexander V. Chernikov qsort(olh + 1, olh->count, olh->objsize, ifinfo_cmp); 588468394ec8SAlexander V. Chernikov 588568394ec8SAlexander V. Chernikov info = (ipfw_iface_info *)(olh + 1); 588668394ec8SAlexander V. Chernikov for (i = 0; i < olh->count; i++) { 588768394ec8SAlexander V. Chernikov if (info->flags & IPFW_IFFLAG_RESOLVED) 588868394ec8SAlexander V. Chernikov printf("%s ifindex: %d refcount: %u changes: %u\n", 588968394ec8SAlexander V. Chernikov info->ifname, info->ifindex, info->refcnt, 589068394ec8SAlexander V. Chernikov info->gencnt); 589168394ec8SAlexander V. Chernikov else 589268394ec8SAlexander V. Chernikov printf("%s ifindex: unresolved refcount: %u changes: %u\n", 589368394ec8SAlexander V. Chernikov info->ifname, info->refcnt, info->gencnt); 589468394ec8SAlexander V. Chernikov info = (ipfw_iface_info *)((caddr_t)info + olh->objsize); 589568394ec8SAlexander V. Chernikov } 589668394ec8SAlexander V. Chernikov 589768394ec8SAlexander V. Chernikov free(olh); 589868394ec8SAlexander V. Chernikov } 5899