| 1 | /* | 
|---|
| 2 | * Copyright (c) 2008-2021 Apple Inc. All rights reserved. | 
|---|
| 3 | * | 
|---|
| 4 | * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ | 
|---|
| 5 | * | 
|---|
| 6 | * This file contains Original Code and/or Modifications of Original Code | 
|---|
| 7 | * as defined in and that are subject to the Apple Public Source License | 
|---|
| 8 | * Version 2.0 (the 'License'). You may not use this file except in | 
|---|
| 9 | * compliance with the License. The rights granted to you under the License | 
|---|
| 10 | * may not be used to create, or enable the creation or redistribution of, | 
|---|
| 11 | * unlawful or unlicensed copies of an Apple operating system, or to | 
|---|
| 12 | * circumvent, violate, or enable the circumvention or violation of, any | 
|---|
| 13 | * terms of an Apple operating system software license agreement. | 
|---|
| 14 | * | 
|---|
| 15 | * Please obtain a copy of the License at | 
|---|
| 16 | * http://www.opensource.apple.com/apsl/ and read it before using this file. | 
|---|
| 17 | * | 
|---|
| 18 | * The Original Code and all software distributed under the License are | 
|---|
| 19 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER | 
|---|
| 20 | * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, | 
|---|
| 21 | * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, | 
|---|
| 22 | * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. | 
|---|
| 23 | * Please see the License for the specific language governing rights and | 
|---|
| 24 | * limitations under the License. | 
|---|
| 25 | * | 
|---|
| 26 | * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ | 
|---|
| 27 | */ | 
|---|
| 28 | /*! | 
|---|
| 29 | *       @header kpi_ipfilter.h | 
|---|
| 30 | *       This header defines an API to attach IP filters. IP filters may be | 
|---|
| 31 | *       attached to intercept either IPv4 or IPv6 packets. The filters can | 
|---|
| 32 | *       intercept all IP packets in to and out of the host regardless of | 
|---|
| 33 | *       interface. | 
|---|
| 34 | */ | 
|---|
| 35 |  | 
|---|
| 36 | #ifndef __KPI_IPFILTER__ | 
|---|
| 37 | #define __KPI_IPFILTER__ | 
|---|
| 38 |  | 
|---|
| 39 | #ifndef PRIVATE | 
|---|
| 40 | #include <Availability.h> | 
|---|
| 41 | #define __NKE_API_DEPRECATED __API_DEPRECATED("Network Kernel Extension KPI is deprecated", macos(10.4, 10.15)) | 
|---|
| 42 | #else | 
|---|
| 43 | #define __NKE_API_DEPRECATED | 
|---|
| 44 | #endif /* PRIVATE */ | 
|---|
| 45 |  | 
|---|
| 46 | /* | 
|---|
| 47 | * ipf_pktopts | 
|---|
| 48 | * | 
|---|
| 49 | * Options for outgoing packets. The options need to be preserved when | 
|---|
| 50 | * re-injecting a packet. | 
|---|
| 51 | */ | 
|---|
| 52 | struct ipf_pktopts { | 
|---|
| 53 | u_int32_t                       ippo_flags; | 
|---|
| 54 | ifnet_t                         ippo_mcast_ifnet; | 
|---|
| 55 | int                             ippo_mcast_loop; | 
|---|
| 56 | u_int8_t                        ippo_mcast_ttl; | 
|---|
| 57 | }; | 
|---|
| 58 | #define IPPOF_MCAST_OPTS            0x1 | 
|---|
| 59 | #ifdef PRIVATE | 
|---|
| 60 | #define IPPOF_BOUND_IF              0x2 | 
|---|
| 61 | #define IPPOF_NO_IFT_CELLULAR       0x4 | 
|---|
| 62 | #define IPPOF_SELECT_SRCIF          0x8 | 
|---|
| 63 | #define IPPOF_BOUND_SRCADDR         0x10 | 
|---|
| 64 | #define IPPOF_SHIFT_IFSCOPE         16 | 
|---|
| 65 | #define IPPOF_NO_IFF_EXPENSIVE      0x20 | 
|---|
| 66 | #define IPPOF_NO_IFF_CONSTRAINED    0x40 | 
|---|
| 67 | #endif /* PRIVATE */ | 
|---|
| 68 |  | 
|---|
| 69 | typedef struct ipf_pktopts *ipf_pktopts_t; | 
|---|
| 70 |  | 
|---|
| 71 | __BEGIN_DECLS | 
|---|
| 72 |  | 
|---|
| 73 | /*! | 
|---|
| 74 | *       @typedef ipf_input_func | 
|---|
| 75 | * | 
|---|
| 76 | *       @discussion ipf_input_func is used to filter incoming ip packets. | 
|---|
| 77 | *               The IP filter is called for packets from all interfaces. The | 
|---|
| 78 | *               filter is called between when the general IP processing is | 
|---|
| 79 | *               handled and when the packet is passed up to the next layer | 
|---|
| 80 | *               protocol such as udp or tcp. In the case of encapsulation, such | 
|---|
| 81 | *               as UDP in ESP (IPsec), your filter will be called once for ESP | 
|---|
| 82 | *               and then again for UDP. This will give your filter an | 
|---|
| 83 | *               opportunity to process the ESP header as well as the decrypted | 
|---|
| 84 | *               packet. Offset and protocol are used to determine where in the | 
|---|
| 85 | *               packet processing is currently occuring. If you're only | 
|---|
| 86 | *               interested in TCP or UDP packets, just return 0 if protocol | 
|---|
| 87 | *               doesn't match TCP or UDP. | 
|---|
| 88 | *       @param cookie The cookie specified when your filter was attached. | 
|---|
| 89 | *       @param data The reassembled ip packet, data will start at the ip | 
|---|
| 90 | *               header. | 
|---|
| 91 | *       @param offset An offset to the next header | 
|---|
| 92 | *               (udp/tcp/icmp/esp/etc...). | 
|---|
| 93 | *       @param protocol The protocol type (udp/tcp/icmp/etc...) of the IP packet | 
|---|
| 94 | *       @result Return: | 
|---|
| 95 | *               0 - The caller will continue with normal processing of the | 
|---|
| 96 | *                       packet. | 
|---|
| 97 | *               EJUSTRETURN - The caller will stop processing the packet, | 
|---|
| 98 | *                       the packet will not be freed. | 
|---|
| 99 | *               Anything Else - The caller will free the packet and stop | 
|---|
| 100 | *                       processing. | 
|---|
| 101 | */ | 
|---|
| 102 | typedef errno_t (*ipf_input_func)(void *cookie, mbuf_t *data, int offset, | 
|---|
| 103 | u_int8_t protocol); | 
|---|
| 104 |  | 
|---|
| 105 | /*! | 
|---|
| 106 | *       @typedef ipf_output_func | 
|---|
| 107 | * | 
|---|
| 108 | *       @discussion ipf_output_func is used to filter outbound ip packets. | 
|---|
| 109 | *               The IP filter is called for packets to all interfaces. The | 
|---|
| 110 | *               filter is called before fragmentation and IPsec processing. If | 
|---|
| 111 | *               you need to change the destination IP address, call | 
|---|
| 112 | *               ipf_inject_output and return EJUSTRETURN. | 
|---|
| 113 | *       @param cookie The cookie specified when your filter was attached. | 
|---|
| 114 | *       @param data The ip packet, will contain an IP header followed by the | 
|---|
| 115 | *               rest of the IP packet. | 
|---|
| 116 | *       @result Return: | 
|---|
| 117 | *               0 - The caller will continue with normal processing of the | 
|---|
| 118 | *                       packet. | 
|---|
| 119 | *               EJUSTRETURN - The caller will stop processing the packet, | 
|---|
| 120 | *                       the packet will not be freed. | 
|---|
| 121 | *               Anything Else - The caller will free the packet and stop | 
|---|
| 122 | *                       processing. | 
|---|
| 123 | */ | 
|---|
| 124 | typedef errno_t (*ipf_output_func)(void *cookie, mbuf_t *data, | 
|---|
| 125 | ipf_pktopts_t options); | 
|---|
| 126 |  | 
|---|
| 127 | /*! | 
|---|
| 128 | *       @typedef ipf_detach_func | 
|---|
| 129 | * | 
|---|
| 130 | *       @discussion ipf_detach_func is called to notify your filter that it | 
|---|
| 131 | *               has been detached. | 
|---|
| 132 | *       @param cookie The cookie specified when your filter was attached. | 
|---|
| 133 | */ | 
|---|
| 134 | typedef void (*ipf_detach_func)(void *cookie); | 
|---|
| 135 |  | 
|---|
| 136 | /*! | 
|---|
| 137 | *       @typedef ipf_filter | 
|---|
| 138 | *       @discussion This structure is used to define an IP filter for | 
|---|
| 139 | *               use with the ipf_addv4 or ipf_addv6 function. | 
|---|
| 140 | *       @field cookie A kext defined cookie that will be passed to all | 
|---|
| 141 | *               filter functions. | 
|---|
| 142 | *       @field name A filter name used for debugging purposes. | 
|---|
| 143 | *       @field ipf_input The filter function to handle inbound packets. | 
|---|
| 144 | *       @field ipf_output The filter function to handle outbound packets. | 
|---|
| 145 | *       @field ipf_detach The filter function to notify of a detach. | 
|---|
| 146 | */ | 
|---|
| 147 | struct ipf_filter { | 
|---|
| 148 | void            *cookie; | 
|---|
| 149 | const char      *name; | 
|---|
| 150 | ipf_input_func  ipf_input; | 
|---|
| 151 | ipf_output_func ipf_output; | 
|---|
| 152 | ipf_detach_func ipf_detach; | 
|---|
| 153 | }; | 
|---|
| 154 |  | 
|---|
| 155 | struct opaque_ipfilter; | 
|---|
| 156 | typedef struct opaque_ipfilter *ipfilter_t; | 
|---|
| 157 |  | 
|---|
| 158 | /*! | 
|---|
| 159 | *       @function ipf_addv4 | 
|---|
| 160 | *       @discussion Attaches an IPv4 ip filter. | 
|---|
| 161 | *       @param filter A structure defining the filter. | 
|---|
| 162 | *       @param filter_ref A reference to the filter used to detach it. | 
|---|
| 163 | *       @result 0 on success otherwise the errno error. | 
|---|
| 164 | */ | 
|---|
| 165 | #ifdef KERNEL_PRIVATE | 
|---|
| 166 | extern errno_t ipf_addv4_internal(const struct ipf_filter *filter, | 
|---|
| 167 | ipfilter_t *filter_ref); | 
|---|
| 168 |  | 
|---|
| 169 | #define ipf_addv4(filter, filter_ref) \ | 
|---|
| 170 | ipf_addv4_internal((filter), (filter_ref)) | 
|---|
| 171 | #else | 
|---|
| 172 | extern errno_t ipf_addv4(const struct ipf_filter *filter, | 
|---|
| 173 | ipfilter_t *filter_ref) | 
|---|
| 174 | __NKE_API_DEPRECATED; | 
|---|
| 175 | #endif /* KERNEL_PRIVATE */ | 
|---|
| 176 |  | 
|---|
| 177 | /*! | 
|---|
| 178 | *       @function ipf_addv6 | 
|---|
| 179 | *       @discussion Attaches an IPv6 ip filter. | 
|---|
| 180 | *       @param filter A structure defining the filter. | 
|---|
| 181 | *       @param filter_ref A reference to the filter used to detach it. | 
|---|
| 182 | *       @result 0 on success otherwise the errno error. | 
|---|
| 183 | */ | 
|---|
| 184 | #ifdef KERNEL_PRIVATE | 
|---|
| 185 | extern errno_t ipf_addv6_internal(const struct ipf_filter *filter, | 
|---|
| 186 | ipfilter_t *filter_ref); | 
|---|
| 187 |  | 
|---|
| 188 | #define ipf_addv6(filter, filter_ref) \ | 
|---|
| 189 | ipf_addv6_internal((filter), (filter_ref)) | 
|---|
| 190 | #else | 
|---|
| 191 | extern errno_t ipf_addv6(const struct ipf_filter *filter, | 
|---|
| 192 | ipfilter_t *filter_ref) | 
|---|
| 193 | __NKE_API_DEPRECATED; | 
|---|
| 194 | #endif /* KERNEL_PRIVATE */ | 
|---|
| 195 |  | 
|---|
| 196 | /*! | 
|---|
| 197 | *       @function ipf_remove | 
|---|
| 198 | *       @discussion Detaches an IPv4 or IPv6 filter. | 
|---|
| 199 | *       @param filter_ref The reference to the filter returned from ipf_addv4 or | 
|---|
| 200 | *               ipf_addv6. | 
|---|
| 201 | *       @result 0 on success otherwise the errno error. | 
|---|
| 202 | */ | 
|---|
| 203 | extern errno_t ipf_remove(ipfilter_t filter_ref) | 
|---|
| 204 | __NKE_API_DEPRECATED; | 
|---|
| 205 |  | 
|---|
| 206 | /*! | 
|---|
| 207 | *       @function ipf_inject_input | 
|---|
| 208 | *       @discussion Inject an IP packet as though it had just been | 
|---|
| 209 | *               reassembled in ip_input. When re-injecting a packet intercepted | 
|---|
| 210 | *               by the filter's ipf_input function, an IP filter can pass its | 
|---|
| 211 | *               reference to avoid processing the packet twice. This also | 
|---|
| 212 | *               prevents ip filters installed before this filter from | 
|---|
| 213 | *               getting a chance to process the packet. If the filter modified | 
|---|
| 214 | *               the packet, it should not specify the filter ref to give other | 
|---|
| 215 | *               filters a chance to process the new packet. | 
|---|
| 216 | * | 
|---|
| 217 | *               Caller is responsible for freeing mbuf chain in the event that | 
|---|
| 218 | *               ipf_inject_input returns an error. | 
|---|
| 219 | *       @param data The complete IPv4 or IPv6 packet, receive interface must | 
|---|
| 220 | *               be set. | 
|---|
| 221 | *       @param filter_ref The reference to the filter injecting the data | 
|---|
| 222 | *       @result 0 on success otherwise the errno error. | 
|---|
| 223 | */ | 
|---|
| 224 | extern errno_t ipf_inject_input(mbuf_t data, ipfilter_t filter_ref) | 
|---|
| 225 | __NKE_API_DEPRECATED; | 
|---|
| 226 |  | 
|---|
| 227 | /*! | 
|---|
| 228 | *       @function ipf_inject_output | 
|---|
| 229 | *       @discussion Inject an IP packet as though it had just been sent to | 
|---|
| 230 | *               ip_output. When re-injecting a packet intercepted by the | 
|---|
| 231 | *               filter's ipf_output function, an IP filter can pass its | 
|---|
| 232 | *               reference to avoid processing the packet twice. This also | 
|---|
| 233 | *               prevents ip filters installed before this filter from getting a | 
|---|
| 234 | *               chance to process the packet. If the filter modified the packet, | 
|---|
| 235 | *               it should not specify the filter ref to give other filters a | 
|---|
| 236 | *               chance to process the new packet. | 
|---|
| 237 | *       @param data The complete IPv4 or IPv6 packet. | 
|---|
| 238 | *       @param filter_ref The reference to the filter injecting the data | 
|---|
| 239 | *       @param options Output options for the packet | 
|---|
| 240 | *       @result 0 on success otherwise the errno error. ipf_inject_output | 
|---|
| 241 | *               will always free the mbuf. | 
|---|
| 242 | */ | 
|---|
| 243 | extern errno_t ipf_inject_output(mbuf_t data, ipfilter_t filter_ref, | 
|---|
| 244 | ipf_pktopts_t options) | 
|---|
| 245 | __NKE_API_DEPRECATED; | 
|---|
| 246 | __END_DECLS | 
|---|
| 247 | #undef __NKE_API_DEPRECATED | 
|---|
| 248 | #endif /* __KPI_IPFILTER__ */ | 
|---|
| 249 |  | 
|---|