1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #pragma ident "%Z%%M% %I% %E% SMI" 27 28 #include <sys/types.h> 29 #include <sys/systm.h> 30 #include <sys/kmem.h> 31 #include <sys/disp.h> 32 #include <sys/stream.h> 33 #include <sys/strsubr.h> 34 #include <sys/strsun.h> 35 #include <sys/policy.h> 36 #include <sys/tsol/label_macro.h> 37 #include <sys/tsol/tndb.h> 38 #include <sys/tsol/tnet.h> 39 #include <inet/ip.h> 40 #include <inet/ip6.h> 41 #include <inet/tcp.h> 42 #include <inet/ipclassifier.h> 43 #include <inet/ip_ire.h> 44 #include <inet/ip_ftable.h> 45 46 /* 47 * This routine takes a sensitivity label as input and creates a CIPSO 48 * option in the specified buffer. It returns the size of the CIPSO option. 49 * If the sensitivity label is too large for the CIPSO option, then 0 50 * is returned. 51 * 52 * tsol2cipso_tt1 returns 0 for failure and greater than 0 for success 53 * (more accurately, success means a return value between 10 and 40). 54 */ 55 56 static int 57 tsol2cipso_tt1(const bslabel_t *sl, unsigned char *cop, uint32_t doi) 58 { 59 struct cipso_tag_type_1 *tt1; 60 const _bslabel_impl_t *bsl; 61 const uchar_t *ucp; 62 int i; 63 64 if (doi == 0) 65 return (0); 66 67 /* check for Admin High sensitivity label */ 68 if (blequal(sl, label2bslabel(l_admin_high))) 69 return (0); 70 71 /* check whether classification will fit in one octet */ 72 bsl = (const _bslabel_impl_t *)sl; 73 if (LCLASS(bsl) & 0xFF00) 74 return (0); 75 76 /* 77 * Check whether compartments will fit in 30 octets. 78 * Compartments 241 - 256 are not allowed. 79 */ 80 if (ntohl(bsl->compartments.c8) & 0x0000FFFF) 81 return (0); 82 83 /* 84 * Compute option length and tag length. 85 * 'p' points to the last two bytes in the Sensitivity Label's 86 * compartments; these cannot be mapped into CIPSO compartments. 87 */ 88 ucp = (const uchar_t *)&bsl->compartments.c8 + 2; 89 while (--ucp >= (const uchar_t *)&bsl->compartments.c1) 90 if (*ucp != 0) 91 break; 92 93 i = ucp - (const uchar_t *)&bsl->compartments.c1 + 1; 94 95 if (cop == NULL) 96 return (10 + i); 97 98 doi = htonl(doi); 99 ucp = (const uchar_t *)&doi; 100 cop[IPOPT_OPTVAL] = IPOPT_COMSEC; 101 cop[IPOPT_OLEN] = 10 + i; 102 cop[IPOPT_OLEN+1] = ucp[0]; 103 cop[IPOPT_OLEN+2] = ucp[1]; 104 cop[IPOPT_OLEN+3] = ucp[2]; 105 cop[IPOPT_OLEN+4] = ucp[3]; 106 tt1 = (struct cipso_tag_type_1 *)&cop[IPOPT_OLEN + 5]; 107 tt1->tag_type = 1; 108 tt1->tag_align = 0; 109 tt1->tag_sl = LCLASS(bsl); 110 tt1->tag_length = 4 + i; 111 112 bcopy(&bsl->compartments.c1, tt1->tag_cat, i); 113 114 return (cop[IPOPT_OLEN]); 115 } 116 117 /* 118 * The following routine copies a datagram's option into the specified buffer 119 * (if buffer pointer is non-null), or returns a pointer to the label within 120 * the streams message (if buffer is null). In both cases, tsol_get_option 121 * returns the option's type. 122 * 123 * tsol_get_option assumes that the specified buffer is large enough to 124 * hold the largest valid CIPSO option. Since the total number of 125 * IP header options cannot exceed 40 bytes, a 40 byte buffer is a good choice. 126 */ 127 128 tsol_ip_label_t 129 tsol_get_option(mblk_t *mp, uchar_t **buffer) 130 { 131 ipha_t *ipha; 132 uchar_t *opt; 133 uint32_t totallen; 134 uint32_t optval; 135 uint32_t optlen; 136 137 ipha = (ipha_t *)mp->b_rptr; 138 139 /* 140 * Get length (in 4 byte octets) of IP header options. 141 * If header doesn't contain options, then return OPT_NONE. 142 */ 143 totallen = ipha->ipha_version_and_hdr_length - 144 (uint8_t)((IP_VERSION << 4) + IP_SIMPLE_HDR_LENGTH_IN_WORDS); 145 146 if (totallen == 0) 147 return (OPT_NONE); 148 149 totallen <<= 2; 150 151 /* 152 * Search for CIPSO option. 153 * If no such option is present, then return OPT_NONE. 154 */ 155 opt = (uchar_t *)&ipha[1]; 156 while (totallen != 0) { 157 switch (optval = opt[IPOPT_OPTVAL]) { 158 case IPOPT_EOL: 159 return (OPT_NONE); 160 case IPOPT_NOP: 161 optlen = 1; 162 break; 163 default: 164 if (totallen <= IPOPT_OLEN) 165 return (OPT_NONE); 166 optlen = opt[IPOPT_OLEN]; 167 if (optlen < 2) 168 return (OPT_NONE); 169 } 170 if (optlen > totallen) 171 return (OPT_NONE); 172 /* 173 * Copy pointer to option into '*buffer' and 174 * return the option type. 175 */ 176 switch (optval) { 177 case IPOPT_COMSEC: 178 *buffer = opt; 179 if (TSOL_CIPSO_TAG_OFFSET < optlen && 180 opt[TSOL_CIPSO_TAG_OFFSET] == 1) 181 return (OPT_CIPSO); 182 return (OPT_NONE); 183 } 184 totallen -= optlen; 185 opt += optlen; 186 } 187 return (OPT_NONE); 188 } 189 190 /* 191 * tsol_compute_label() 192 * 193 * This routine computes the IP label that should be on a packet based on the 194 * connection and destination information. 195 * 196 * Returns: 197 * 0 Fetched label 198 * EACCES The packet failed the remote host accreditation 199 * ENOMEM Memory allocation failure 200 * EINVAL Label cannot be computed 201 */ 202 int 203 tsol_compute_label(const cred_t *credp, ipaddr_t dst, uchar_t *opt_storage, 204 boolean_t isexempt) 205 { 206 uint_t sec_opt_len; 207 ts_label_t *tsl; 208 tsol_tpc_t *dst_rhtp; 209 ire_t *ire, *sire = NULL; 210 boolean_t compute_label = B_FALSE; 211 tsol_ire_gw_secattr_t *attrp; 212 zoneid_t zoneid; 213 214 if (opt_storage != NULL) 215 opt_storage[IPOPT_OLEN] = 0; 216 217 if ((tsl = crgetlabel(credp)) == NULL) 218 return (0); 219 220 /* always pass multicast */ 221 if (CLASSD(dst)) 222 return (0); 223 224 if ((dst_rhtp = find_tpc(&dst, IPV4_VERSION, B_FALSE)) == NULL) { 225 DTRACE_PROBE3(tx__tnopt__log__info__labeling__lookupdst__v4, 226 char *, "destination ip(1) not in database (with creds(2))", 227 ipaddr_t, dst, cred_t *, credp); 228 return (EINVAL); 229 } 230 231 zoneid = crgetzoneid(credp); 232 233 switch (dst_rhtp->tpc_tp.host_type) { 234 case UNLABELED: 235 /* 236 * Only add a label if the unlabeled destination is 237 * not broadcast/local/loopback address, that it is 238 * not on the same subnet, and that the next-hop 239 * gateway is labeled. 240 */ 241 ire = ire_cache_lookup(dst, zoneid, tsl); 242 243 if (ire != NULL && (ire->ire_type & (IRE_BROADCAST | IRE_LOCAL | 244 IRE_LOOPBACK | IRE_INTERFACE)) != 0) { 245 IRE_REFRELE(ire); 246 TPC_RELE(dst_rhtp); 247 return (0); 248 } else if (ire == NULL) { 249 ire = ire_ftable_lookup(dst, 0, 0, 0, NULL, &sire, 250 zoneid, 0, tsl, (MATCH_IRE_RECURSIVE | 251 MATCH_IRE_DEFAULT | MATCH_IRE_SECATTR)); 252 } 253 254 /* no route to destination */ 255 if (ire == NULL) { 256 DTRACE_PROBE4( 257 tx__tnopt__log__info__labeling__routedst__v4, 258 char *, "No route to unlabeled dest ip(1)/tpc(2) " 259 "with creds(3).", ipaddr_t, dst, tsol_tpc_t *, 260 dst_rhtp, cred_t *, credp); 261 TPC_RELE(dst_rhtp); 262 return (EINVAL); 263 } 264 265 /* 266 * Prefix IRE from f-table lookup means that the destination 267 * is not directly connected; check the next-hop attributes. 268 */ 269 if (sire != NULL) { 270 ASSERT(ire != NULL); 271 IRE_REFRELE(ire); 272 ire = sire; 273 } 274 275 attrp = ire->ire_gw_secattr; 276 if (attrp != NULL && attrp->igsa_rhc != NULL && 277 attrp->igsa_rhc->rhc_tpc->tpc_tp.host_type != UNLABELED) 278 compute_label = B_TRUE; 279 280 /* 281 * Can talk to unlabeled hosts if 282 * (1) zone's label matches the default label, or 283 * (2) SO_MAC_EXEMPT is on and we dominate the peer's label 284 * (3) SO_MAC_EXEMPT is on and this is the global zone 285 */ 286 if (dst_rhtp->tpc_tp.tp_doi != tsl->tsl_doi || 287 (!blequal(&dst_rhtp->tpc_tp.tp_def_label, 288 &tsl->tsl_label) && (!isexempt || 289 (zoneid != GLOBAL_ZONEID && !bldominates(&tsl->tsl_label, 290 &dst_rhtp->tpc_tp.tp_def_label))))) { 291 DTRACE_PROBE4(tx__tnopt__log__info__labeling__mac__v4, 292 char *, "unlabeled dest ip(1)/tpc(2) " 293 "non-matching creds(3).", ipaddr_t, dst, 294 tsol_tpc_t *, dst_rhtp, cred_t *, credp); 295 IRE_REFRELE(ire); 296 TPC_RELE(dst_rhtp); 297 return (EACCES); 298 } 299 300 IRE_REFRELE(ire); 301 break; 302 303 case SUN_CIPSO: 304 /* 305 * Can talk to labeled hosts if zone's label is within target's 306 * label range or set. 307 */ 308 if (dst_rhtp->tpc_tp.tp_cipso_doi_cipso != tsl->tsl_doi || 309 (!_blinrange(&tsl->tsl_label, 310 &dst_rhtp->tpc_tp.tp_sl_range_cipso) && 311 !blinlset(&tsl->tsl_label, 312 dst_rhtp->tpc_tp.tp_sl_set_cipso))) { 313 DTRACE_PROBE4(tx__tnopt__log__info__labeling__mac__v4, 314 char *, "labeled dest ip(1)/tpc(2) " 315 "non-matching creds(3).", ipaddr_t, dst, 316 tsol_tpc_t *, dst_rhtp, cred_t *, credp); 317 TPC_RELE(dst_rhtp); 318 return (EACCES); 319 } 320 compute_label = B_TRUE; 321 break; 322 323 default: 324 TPC_RELE(dst_rhtp); 325 return (EACCES); 326 } 327 328 if (!compute_label) { 329 TPC_RELE(dst_rhtp); 330 return (0); 331 } 332 333 /* compute the CIPSO option */ 334 if (dst_rhtp->tpc_tp.host_type != UNLABELED) 335 sec_opt_len = tsol2cipso_tt1(&tsl->tsl_label, opt_storage, 336 tsl->tsl_doi); 337 else 338 sec_opt_len = tsol2cipso_tt1(&dst_rhtp->tpc_tp.tp_def_label, 339 opt_storage, tsl->tsl_doi); 340 TPC_RELE(dst_rhtp); 341 342 if (sec_opt_len == 0) { 343 DTRACE_PROBE4(tx__tnopt__log__error__labeling__lostops__v4, 344 char *, 345 "options lack length for dest ip(1)/tpc(2) with creds(3).", 346 ipaddr_t, dst, tsol_tpc_t *, dst_rhtp, cred_t *, credp); 347 return (EINVAL); 348 } 349 350 return (0); 351 } 352 353 /* 354 * Remove any existing security option (CIPSO) from the given IP 355 * header, move the 'buflen' bytes back to fill the gap, and return the number 356 * of bytes removed (as zero or negative number). Assumes that the headers are 357 * sane. 358 */ 359 int 360 tsol_remove_secopt(ipha_t *ipha, int buflen) 361 { 362 int remlen, olen, oval, delta; 363 uchar_t *fptr, *tptr; 364 boolean_t noop_keep; 365 366 remlen = IPH_HDR_LENGTH(ipha) - IP_SIMPLE_HDR_LENGTH; 367 fptr = tptr = (uchar_t *)(ipha + 1); 368 noop_keep = B_TRUE; 369 while (remlen > 0) { 370 oval = fptr[IPOPT_OPTVAL]; 371 372 /* terminate on end of list */ 373 if (oval == IPOPT_EOL) 374 break; 375 376 /* 377 * Delete any no-ops following a deleted option, at least up 378 * to a 4 octet alignment; copy others. 379 */ 380 if (oval == IPOPT_NOP) { 381 if (((fptr - (uchar_t *)ipha) & 3) == 0) 382 noop_keep = B_TRUE; 383 if (noop_keep) 384 *tptr++ = oval; 385 fptr++; 386 remlen--; 387 continue; 388 } 389 390 /* stop on corrupted list; just do nothing. */ 391 if (remlen < 2) 392 return (0); 393 olen = fptr[IPOPT_OLEN]; 394 if (olen < 2 || olen > remlen) 395 return (0); 396 397 /* skip over security options to delete them */ 398 if (oval == IPOPT_COMSEC || oval == IPOPT_SECURITY) { 399 noop_keep = B_FALSE; 400 fptr += olen; 401 remlen -= olen; 402 continue; 403 } 404 405 /* copy the rest */ 406 noop_keep = B_TRUE; 407 if (tptr != fptr) 408 ovbcopy(fptr, tptr, olen); 409 fptr += olen; 410 tptr += olen; 411 remlen -= olen; 412 } 413 414 fptr += remlen; 415 416 /* figure how much padding we'll need for header alignment */ 417 olen = (tptr - (uchar_t *)ipha) & 3; 418 if (olen > 0) { 419 olen = 4 - olen; 420 /* pad with end-of-list */ 421 bzero(tptr, olen); 422 tptr += olen; 423 } 424 425 /* slide back the headers that follow and update the IP header */ 426 delta = fptr - tptr; 427 if (delta != 0) { 428 ovbcopy(fptr, tptr, ((uchar_t *)ipha + buflen) - fptr); 429 ipha->ipha_version_and_hdr_length -= delta / 4; 430 } 431 return (-delta); 432 } 433 434 /* 435 * Insert the option in 'optbuf' into the IP header pointed to by 'ipha', and 436 * move the data following the IP header (up to buflen) to accomodate the new 437 * option. Assumes that up to IP_MAX_OPT_LENGTH bytes are available (in total) 438 * for IP options. Returns the number of bytes actually inserted, or -1 if the 439 * option cannot be inserted. (Note that negative return values are possible 440 * when noops must be compressed, and that only -1 indicates error. Successful 441 * return value is always evenly divisible by 4, by definition.) 442 */ 443 int 444 tsol_prepend_option(uchar_t *optbuf, ipha_t *ipha, int buflen) 445 { 446 int remlen, padding, lastpad, totlen; 447 int oval, olen; 448 int delta; 449 uchar_t *optr; 450 uchar_t tempopt[IP_MAX_OPT_LENGTH], *toptr; 451 452 if (optbuf[IPOPT_OPTVAL] == IPOPT_EOL || 453 optbuf[IPOPT_OPTVAL] == IPOPT_NOP || 454 optbuf[IPOPT_OLEN] == 0) 455 return (0); 456 457 ASSERT(optbuf[IPOPT_OLEN] >= 2 && 458 optbuf[IPOPT_OLEN] <= IP_MAX_OPT_LENGTH); 459 460 /* first find the real (unpadded) length of the existing options */ 461 remlen = IPH_HDR_LENGTH(ipha) - IP_SIMPLE_HDR_LENGTH; 462 padding = totlen = lastpad = 0; 463 optr = (uchar_t *)(ipha + 1); 464 while (remlen > 0) { 465 oval = optr[IPOPT_OPTVAL]; 466 467 /* stop at end of list */ 468 if (oval == IPOPT_EOL) 469 break; 470 471 /* skip no-ops, noting that length byte isn't present */ 472 if (oval == IPOPT_NOP) { 473 optr++; 474 padding++; 475 lastpad++; 476 totlen++; 477 remlen--; 478 continue; 479 } 480 481 /* give up on a corrupted list; report failure */ 482 if (remlen < 2) 483 return (-1); 484 olen = optr[IPOPT_OLEN]; 485 if (olen < 2 || olen > remlen) 486 return (-1); 487 488 lastpad = 0; 489 optr += olen; 490 totlen += olen; 491 remlen -= olen; 492 } 493 494 /* completely ignore any trailing padding */ 495 totlen -= lastpad; 496 padding -= lastpad; 497 498 /* 499 * If some sort of inter-option alignment was present, try to preserve 500 * that alignment. If alignment pushes us out past the maximum, then 501 * discard it and try to compress to fit. (We just "assume" that any 502 * padding added was attempting to get 32 bit alignment. If that's 503 * wrong, that's just too bad.) 504 */ 505 if (padding > 0) { 506 olen = (optbuf[IPOPT_OLEN] + 3) & ~3; 507 if (olen + totlen > IP_MAX_OPT_LENGTH) { 508 totlen -= padding; 509 if (olen + totlen > IP_MAX_OPT_LENGTH) 510 return (-1); 511 padding = 0; 512 } 513 } 514 515 /* 516 * Since we may need to compress or expand the option list, we write to 517 * a temporary buffer and then copy the results back to the IP header. 518 */ 519 toptr = tempopt; 520 521 /* compute actual option to insert */ 522 olen = optbuf[IPOPT_OLEN]; 523 bcopy(optbuf, toptr, olen); 524 toptr += olen; 525 if (padding > 0) { 526 while ((olen & 3) != 0) { 527 *toptr++ = IPOPT_NOP; 528 olen++; 529 } 530 } 531 532 /* copy over the existing options */ 533 optr = (uchar_t *)(ipha + 1); 534 while (totlen > 0) { 535 oval = optr[IPOPT_OPTVAL]; 536 537 /* totlen doesn't include end-of-list marker */ 538 ASSERT(oval != IPOPT_EOL); 539 540 /* handle no-ops; copy if desired, ignore otherwise */ 541 if (oval == IPOPT_NOP) { 542 if (padding > 0) { 543 /* note: cannot overflow due to checks above */ 544 ASSERT(toptr < tempopt + IP_MAX_OPT_LENGTH); 545 *toptr++ = oval; 546 } 547 optr++; 548 totlen--; 549 continue; 550 } 551 552 /* list cannot be corrupt at this point */ 553 ASSERT(totlen >= 2); 554 olen = optr[IPOPT_OLEN]; 555 ASSERT(olen >= 2 && olen <= totlen); 556 557 /* cannot run out of room due to tests above */ 558 ASSERT(toptr + olen <= tempopt + IP_MAX_OPT_LENGTH); 559 560 bcopy(optr, toptr, olen); 561 optr += olen; 562 toptr += olen; 563 totlen -= olen; 564 } 565 566 /* figure how much padding we'll need for header alignment */ 567 olen = (toptr - tempopt) & 3; 568 if (olen > 0) { 569 olen = 4 - olen; 570 ASSERT(toptr + olen <= tempopt + IP_MAX_OPT_LENGTH); 571 /* pad with end-of-list value */ 572 bzero(toptr, olen); 573 toptr += olen; 574 } 575 576 /* move the headers as needed and update IP header */ 577 olen = (toptr - tempopt) + IP_SIMPLE_HDR_LENGTH; 578 remlen = IPH_HDR_LENGTH(ipha); 579 delta = olen - remlen; 580 if (delta != 0) { 581 ovbcopy((uchar_t *)ipha + remlen, (uchar_t *)ipha + olen, 582 buflen - remlen); 583 ipha->ipha_version_and_hdr_length += delta / 4; 584 } 585 586 /* slap in the new options */ 587 bcopy(tempopt, ipha + 1, olen - IP_SIMPLE_HDR_LENGTH); 588 589 return (delta); 590 } 591 592 /* 593 * tsol_check_label() 594 * 595 * This routine computes the IP label that should be on the packet based on the 596 * connection and destination information. If the label is there, it returns 597 * zero, so the caller knows that the label is syncronized, and further calls 598 * are not required. If the label isn't right, then the right one is inserted. 599 * 600 * The packet's header is clear, before entering IPSec's engine. 601 * 602 * Returns: 603 * 0 Label on packet (was|is now) correct 604 * EACCES The packet failed the remote host accreditation. 605 * ENOMEM Memory allocation failure. 606 * EINVAL Label cannot be computed 607 */ 608 int 609 tsol_check_label(const cred_t *credp, mblk_t **mpp, int *addedp, 610 boolean_t isexempt) 611 { 612 mblk_t *mp = *mpp; 613 ipha_t *ipha; 614 uchar_t opt_storage[IP_MAX_OPT_LENGTH]; 615 uint_t hlen; 616 uint_t sec_opt_len; 617 uchar_t *optr; 618 int added; 619 int retv; 620 621 if (addedp != NULL) 622 *addedp = 0; 623 624 opt_storage[IPOPT_OPTVAL] = 0; 625 626 ipha = (ipha_t *)mp->b_rptr; 627 628 retv = tsol_compute_label(credp, ipha->ipha_dst, opt_storage, isexempt); 629 if (retv != 0) 630 return (retv); 631 632 optr = (uchar_t *)(ipha + 1); 633 hlen = IPH_HDR_LENGTH(ipha) - IP_SIMPLE_HDR_LENGTH; 634 sec_opt_len = opt_storage[IPOPT_OLEN]; 635 636 if (hlen >= sec_opt_len) { 637 /* If no option is supposed to be there, make sure it's not */ 638 if (sec_opt_len == 0 && hlen > 0 && 639 optr[IPOPT_OPTVAL] != IPOPT_COMSEC && 640 optr[IPOPT_OPTVAL] != IPOPT_SECURITY) 641 return (0); 642 /* if the option is there, it's always first */ 643 if (sec_opt_len != 0 && 644 bcmp(opt_storage, optr, sec_opt_len) == 0) 645 return (0); 646 } 647 648 /* 649 * If there is an option there, then it must be the wrong one; delete. 650 */ 651 if (hlen > 0) 652 mp->b_wptr += tsol_remove_secopt(ipha, MBLKL(mp)); 653 654 /* Make sure we have room for the worst-case addition */ 655 hlen = IPH_HDR_LENGTH(ipha) + opt_storage[IPOPT_OLEN]; 656 hlen = (hlen + 3) & ~3; 657 if (hlen > IP_MAX_HDR_LENGTH) 658 hlen = IP_MAX_HDR_LENGTH; 659 hlen -= IPH_HDR_LENGTH(ipha); 660 if (mp->b_wptr + hlen > mp->b_datap->db_lim) { 661 int copylen; 662 mblk_t *new_mp; 663 664 /* allocate enough to be meaningful, but not *too* much */ 665 copylen = MBLKL(mp); 666 if (copylen > 256) 667 copylen = 256; 668 new_mp = allocb(hlen + copylen + 669 (mp->b_rptr - mp->b_datap->db_base), BPRI_HI); 670 if (new_mp == NULL) 671 return (ENOMEM); 672 mblk_setcred(new_mp, DB_CRED(mp)); 673 674 /* keep the bias */ 675 new_mp->b_rptr += mp->b_rptr - mp->b_datap->db_base; 676 new_mp->b_wptr = new_mp->b_rptr + copylen; 677 bcopy(mp->b_rptr, new_mp->b_rptr, copylen); 678 new_mp->b_cont = mp; 679 if ((mp->b_rptr += copylen) >= mp->b_wptr) { 680 new_mp->b_cont = mp->b_cont; 681 freeb(mp); 682 } 683 *mpp = mp = new_mp; 684 ipha = (ipha_t *)mp->b_rptr; 685 } 686 687 added = tsol_prepend_option(opt_storage, ipha, MBLKL(mp)); 688 if (added == -1) 689 goto param_prob; 690 691 if (addedp != NULL) 692 *addedp = added; 693 694 ASSERT((mp->b_wptr + added) <= DB_LIM(mp)); 695 mp->b_wptr += added; 696 697 return (0); 698 699 param_prob: 700 return (EINVAL); 701 } 702 703 /* 704 * IPv6 HopOpt extension header for the label option layout: 705 * - One octet giving the type of the 'next extension header' 706 * - Header extension length in 8-byte words, not including the 707 * 1st 8 bytes, but including any pad bytes at the end. 708 * Eg. A value of 2 means 16 bytes not including the 1st 8 bytes. 709 * - Followed by TLV encoded IPv6 label option. Option layout is 710 * * One octet, IP6OPT_LS 711 * * One octet option length in bytes of the option data following 712 * the length, but not including any pad bytes at the end. 713 * * Four-octet DOI (IP6LS_DOI_V4) 714 * * One octet suboption, IP6LS_TT_V4 715 * * One octet suboption length in bytes of the suboption 716 * following the suboption length, including the suboption 717 * header length, but not including any pad bytes at the end. 718 * - Pad to make the extension header a multiple of 8 bytes. 719 * 720 * This function returns the contents of 'IPv6 option structure' in the above. 721 * i.e starting from the IP6OPT_LS but not including the pad at the end. 722 * The user must prepend two octets (either padding or next header / length) 723 * and append padding out to the next 8 octet boundary. 724 */ 725 int 726 tsol_compute_label_v6(const cred_t *credp, const in6_addr_t *dst, 727 uchar_t *opt_storage, boolean_t isexempt) 728 { 729 tsol_tpc_t *dst_rhtp; 730 ts_label_t *tsl; 731 uint_t sec_opt_len; 732 uint32_t doi; 733 zoneid_t zoneid; 734 ire_t *ire, *sire; 735 tsol_ire_gw_secattr_t *attrp; 736 boolean_t compute_label; 737 738 if (ip6opt_ls == 0) 739 return (EINVAL); 740 741 if (opt_storage != NULL) 742 opt_storage[IPOPT_OLEN] = 0; 743 744 if ((tsl = crgetlabel(credp)) == NULL) 745 return (0); 746 747 /* Always pass multicast */ 748 if (IN6_IS_ADDR_MULTICAST(dst)) 749 return (0); 750 751 if ((dst_rhtp = find_tpc(dst, IPV6_VERSION, B_FALSE)) == NULL) { 752 DTRACE_PROBE3(tx__tnopt__log__info__labeling__lookupdst__v6, 753 char *, "destination ip6(1) not in database with creds(2)", 754 in6_addr_t *, dst, cred_t *, credp); 755 return (EINVAL); 756 } 757 758 zoneid = crgetzoneid(credp); 759 760 /* 761 * Fill in a V6 label. If a new format is added here, make certain 762 * that the maximum size of this label is reflected in sys/tsol/tnet.h 763 * as TSOL_MAX_IPV6_OPTION. 764 */ 765 compute_label = B_FALSE; 766 switch (dst_rhtp->tpc_tp.host_type) { 767 case UNLABELED: 768 /* 769 * Only add a label if the unlabeled destination is 770 * not local or loopback address, that it is 771 * not on the same subnet, and that the next-hop 772 * gateway is labeled. 773 */ 774 sire = NULL; 775 ire = ire_cache_lookup_v6(dst, zoneid, tsl); 776 777 if (ire != NULL && (ire->ire_type & (IRE_LOCAL | 778 IRE_LOOPBACK | IRE_INTERFACE)) != 0) { 779 IRE_REFRELE(ire); 780 TPC_RELE(dst_rhtp); 781 return (0); 782 } else if (ire == NULL) { 783 ire = ire_ftable_lookup_v6(dst, NULL, NULL, 0, NULL, 784 &sire, zoneid, 0, tsl, (MATCH_IRE_RECURSIVE | 785 MATCH_IRE_DEFAULT | MATCH_IRE_SECATTR)); 786 } 787 788 /* no route to destination */ 789 if (ire == NULL) { 790 DTRACE_PROBE4( 791 tx__tnopt__log__info__labeling__routedst__v6, 792 char *, "No route to unlabeled dest ip6(1)/tpc(2) " 793 "with creds(3).", in6_addr_t *, dst, tsol_tpc_t *, 794 dst_rhtp, cred_t *, credp); 795 TPC_RELE(dst_rhtp); 796 return (EINVAL); 797 } 798 799 /* 800 * Prefix IRE from f-table lookup means that the destination 801 * is not directly connected; check the next-hop attributes. 802 */ 803 if (sire != NULL) { 804 ASSERT(ire != NULL); 805 IRE_REFRELE(ire); 806 ire = sire; 807 } 808 809 attrp = ire->ire_gw_secattr; 810 if (attrp != NULL && attrp->igsa_rhc != NULL && 811 attrp->igsa_rhc->rhc_tpc->tpc_tp.host_type != UNLABELED) 812 compute_label = B_TRUE; 813 814 if (dst_rhtp->tpc_tp.tp_doi != tsl->tsl_doi || 815 (!blequal(&dst_rhtp->tpc_tp.tp_def_label, 816 &tsl->tsl_label) && (!isexempt || 817 (zoneid != GLOBAL_ZONEID && !bldominates(&tsl->tsl_label, 818 &dst_rhtp->tpc_tp.tp_def_label))))) { 819 DTRACE_PROBE4(tx__tnopt__log__info__labeling__mac__v6, 820 char *, "unlabeled dest ip6(1)/tpc(2) " 821 "non-matching creds(3)", in6_addr_t *, dst, 822 tsol_tpc_t *, dst_rhtp, cred_t *, credp); 823 IRE_REFRELE(ire); 824 TPC_RELE(dst_rhtp); 825 return (EACCES); 826 } 827 828 IRE_REFRELE(ire); 829 break; 830 831 case SUN_CIPSO: 832 if (dst_rhtp->tpc_tp.tp_cipso_doi_cipso != tsl->tsl_doi || 833 (!_blinrange(&tsl->tsl_label, 834 &dst_rhtp->tpc_tp.tp_sl_range_cipso) && 835 !blinlset(&tsl->tsl_label, 836 dst_rhtp->tpc_tp.tp_sl_set_cipso))) { 837 DTRACE_PROBE4(tx__tnopt__log__info__labeling__mac__v6, 838 char *, 839 "labeled dest ip6(1)/tpc(2) non-matching creds(3).", 840 in6_addr_t *, dst, tsol_tpc_t *, dst_rhtp, 841 cred_t *, credp); 842 TPC_RELE(dst_rhtp); 843 return (EACCES); 844 } 845 compute_label = B_TRUE; 846 break; 847 848 default: 849 TPC_RELE(dst_rhtp); 850 return (EACCES); 851 } 852 853 if (!compute_label) { 854 TPC_RELE(dst_rhtp); 855 return (0); 856 } 857 858 /* compute the CIPSO option */ 859 if (opt_storage != NULL) 860 opt_storage += 8; 861 if (dst_rhtp->tpc_tp.host_type != UNLABELED) { 862 sec_opt_len = tsol2cipso_tt1(&tsl->tsl_label, opt_storage, 863 tsl->tsl_doi); 864 } else { 865 sec_opt_len = tsol2cipso_tt1(&dst_rhtp->tpc_tp.tp_def_label, 866 opt_storage, tsl->tsl_doi); 867 } 868 TPC_RELE(dst_rhtp); 869 870 if (sec_opt_len == 0) { 871 DTRACE_PROBE4(tx__tnopt__log__error__labeling__lostops__v6, 872 char *, 873 "options lack length for dest ip6(1)/tpc(2) with creds(3).", 874 in6_addr_t *, dst, tsol_tpc_t *, dst_rhtp, cred_t *, credp); 875 return (EINVAL); 876 } 877 878 if (opt_storage == NULL) 879 return (0); 880 881 if (sec_opt_len < IP_MAX_OPT_LENGTH) 882 opt_storage[sec_opt_len] = IPOPT_EOL; 883 884 /* 885 * Just in case the option length is odd, round it up to the next even 886 * multiple. The IPv6 option definition doesn't like odd numbers for 887 * some reason. 888 * 889 * Length in the overall option header (IP6OPT_LS) does not include the 890 * option header itself, but the length in the suboption does include 891 * the suboption header. Thus, when there's just one suboption, the 892 * length in the option header is the suboption length plus 4 (for the 893 * DOI value). 894 */ 895 opt_storage[-2] = IP6LS_TT_V4; 896 opt_storage[-1] = (sec_opt_len + 2 + 1) & ~1; 897 opt_storage[-8] = ip6opt_ls; 898 opt_storage[-7] = opt_storage[-1] + 4; 899 doi = htons(IP6LS_DOI_V4); 900 bcopy(&doi, opt_storage - 6, 4); 901 902 return (0); 903 } 904 905 /* 906 * Locate the start of the IP6OPT_LS label option and return it. 907 * Also return the start of the next non-pad option in after_secoptp. 908 * Usually the label option is the first option at least when packets 909 * are generated, but for generality we don't assume that on received packets. 910 */ 911 uchar_t * 912 tsol_find_secopt_v6( 913 const uchar_t *ip6hbh, /* Start of the hop-by-hop extension header */ 914 uint_t hbhlen, /* Length of the hop-by-hop extension header */ 915 uchar_t **after_secoptp, /* Non-pad option following the label option */ 916 boolean_t *hbh_needed) /* Is hop-by-hop hdr needed w/o label */ 917 { 918 uint_t optlen; 919 uint_t optused; 920 const uchar_t *optptr; 921 uchar_t opt_type; 922 const uchar_t *secopt = NULL; 923 924 *hbh_needed = B_FALSE; 925 *after_secoptp = NULL; 926 optlen = hbhlen - 2; 927 optptr = ip6hbh + 2; 928 while (optlen != 0) { 929 opt_type = *optptr; 930 if (opt_type == IP6OPT_PAD1) { 931 optptr++; 932 optlen--; 933 continue; 934 } 935 if (optlen == 1) 936 break; 937 optused = 2 + optptr[1]; 938 if (optused > optlen) 939 break; 940 /* 941 * if we get here, ip6opt_ls can 942 * not be 0 because it will always 943 * match the IP6OPT_PAD1 above. 944 * Therefore ip6opt_ls == 0 forces 945 * this test to always fail here. 946 */ 947 if (opt_type == ip6opt_ls) 948 secopt = optptr; 949 else switch (opt_type) { 950 case IP6OPT_PADN: 951 break; 952 default: 953 /* 954 * There is at least 1 option other than 955 * the label option. So the hop-by-hop header is needed 956 */ 957 *hbh_needed = B_TRUE; 958 if (secopt != NULL) { 959 *after_secoptp = (uchar_t *)optptr; 960 return ((uchar_t *)secopt); 961 } 962 break; 963 } 964 optlen -= optused; 965 optptr += optused; 966 } 967 return ((uchar_t *)secopt); 968 } 969 970 /* 971 * Remove the label option from the hop-by-hop options header if it exists. 972 * 'buflen' is the total length of the packet typically b_wptr - b_rptr. 973 * Header and data following the label option that is deleted are copied 974 * (i.e. slid backward) to the right position. 975 */ 976 int 977 tsol_remove_secopt_v6(ip6_t *ip6h, int buflen) 978 { 979 uchar_t *ip6hbh; /* hop-by-hop header */ 980 uint_t hbhlen; /* hop-by-hop extension header length */ 981 uchar_t *secopt = NULL; 982 uchar_t *after_secopt; 983 uint_t pad; 984 uint_t delta; 985 boolean_t hbh_needed; 986 987 /* 988 * hop-by-hop extension header must appear first, if it does not 989 * exist, there is no label option. 990 */ 991 if (ip6h->ip6_nxt != IPPROTO_HOPOPTS) 992 return (0); 993 994 ip6hbh = (uchar_t *)&ip6h[1]; 995 hbhlen = (ip6hbh[1] + 1) << 3; 996 /* 997 * Locate the start of the label option if it exists and the end 998 * of the label option including pads if any. 999 */ 1000 secopt = tsol_find_secopt_v6(ip6hbh, hbhlen, &after_secopt, 1001 &hbh_needed); 1002 if (secopt == NULL) 1003 return (0); 1004 if (!hbh_needed) { 1005 uchar_t next_hdr; 1006 /* 1007 * The label option was the only option in the hop-by-hop 1008 * header. We don't need the hop-by-hop header itself any 1009 * longer. 1010 */ 1011 next_hdr = ip6hbh[0]; 1012 ovbcopy(ip6hbh + hbhlen, ip6hbh, 1013 buflen - (IPV6_HDR_LEN + hbhlen)); 1014 ip6h->ip6_plen = htons(ntohs(ip6h->ip6_plen) - hbhlen); 1015 ip6h->ip6_nxt = next_hdr; 1016 return (hbhlen); 1017 } 1018 1019 if (after_secopt == NULL) { 1020 /* There is no option following the label option */ 1021 after_secopt = ip6hbh + hbhlen; 1022 } 1023 1024 /* 1025 * After deleting the label option, we need to slide the headers 1026 * and data back, while still maintaining the same alignment (module 8) 1027 * for the other options. So we slide the headers and data back only 1028 * by an integral multiple of 8 bytes, and fill the remaining bytes 1029 * with pads. 1030 */ 1031 delta = after_secopt - secopt; 1032 pad = delta % 8; 1033 if (pad == 1) { 1034 secopt[0] = IP6OPT_PAD1; 1035 } else if (pad > 1) { 1036 secopt[0] = IP6OPT_PADN; 1037 secopt[1] = pad - 2; 1038 if (pad > 2) 1039 bzero(&secopt[2], pad - 2); 1040 } 1041 secopt += pad; 1042 delta -= pad; 1043 ovbcopy(after_secopt, secopt, 1044 (uchar_t *)ip6h + buflen - after_secopt); 1045 ip6hbh[1] -= delta/8; 1046 ip6h->ip6_plen = htons(ntohs(ip6h->ip6_plen) - delta); 1047 1048 return (delta); 1049 } 1050 1051 /* 1052 * 'optbuf' contains a CIPSO label embedded in an IPv6 hop-by-hop option, 1053 * starting with the IP6OPT_LS option type. The format of this hop-by-hop 1054 * option is described in the block comment above tsol_compute_label_v6. 1055 * This function prepends this hop-by-hop option before any other hop-by-hop 1056 * options in the hop-by-hop header if one already exists, else a new 1057 * hop-by-hop header is created and stuffed into the packet following 1058 * the IPv6 header. 'buflen' is the total length of the packet i.e. 1059 * b_wptr - b_rptr. The caller ensures that there is enough space for the 1060 * extra option being added. Header and data following the position where 1061 * the label option is inserted are copied (i.e. slid forward) to the right 1062 * position. 1063 */ 1064 int 1065 tsol_prepend_option_v6(uchar_t *optbuf, ip6_t *ip6h, int buflen) 1066 { 1067 /* 1068 * rawlen is the length of the label option in bytes, not including 1069 * any pads, starting from the IP6OPT_LS (option type) byte. 1070 */ 1071 uint_t rawlen; 1072 1073 uint_t optlen; /* rawlen rounded to an 8 byte multiple */ 1074 uchar_t *ip6hbh; /* start of the hop-by-hop extension header */ 1075 uint_t hbhlen; /* Length of the hop-by-hop extension header */ 1076 uint_t pad_len; 1077 uchar_t *pad_position; 1078 int delta; /* Actual number of bytes inserted */ 1079 1080 rawlen = optbuf[1] + 2; /* Add 2 for the option type, option length */ 1081 ip6hbh = (uchar_t *)&ip6h[1]; 1082 if (ip6h->ip6_nxt == IPPROTO_HOPOPTS) { 1083 /* 1084 * There is a hop-by-hop header present already. In order to 1085 * preserve the alignment of the other options at the existing 1086 * value (modulo 8) we need to pad the label option to a 1087 * multiple of 8 bytes before prepending it to the other 1088 * options. Slide the extension headers and data forward to 1089 * accomodate the label option at the start of the hop-by-hop 1090 * header 1091 */ 1092 delta = optlen = (rawlen + 7) & ~7; 1093 pad_len = optlen - rawlen; 1094 pad_position = ip6hbh + 2 + rawlen; 1095 ovbcopy(ip6hbh + 2, ip6hbh + 2 + optlen, 1096 buflen - (IPV6_HDR_LEN + 2)); 1097 /* 1098 * Bump up the hop-by-hop extension header length by 1099 * the number of 8-byte words added 1100 */ 1101 optlen >>= 3; 1102 if (ip6hbh[1] + optlen > 255) 1103 return (-1); 1104 ip6hbh[1] += optlen; 1105 } else { 1106 /* 1107 * There is no hop-by-hop header in the packet. Construct a 1108 * new Hop-by-hop extension header (a multiple of 8 bytes). 1109 * Slide any other extension headers and data forward to 1110 * accomodate this hop-by-hop header 1111 */ 1112 delta = hbhlen = (2 + rawlen + 7) & ~7; /* +2 for nxthdr, len */ 1113 pad_len = hbhlen - (2 + rawlen); 1114 pad_position = ip6hbh + 2 + rawlen; 1115 ovbcopy(ip6hbh, ip6hbh + hbhlen, buflen - IPV6_HDR_LEN); 1116 ip6hbh[0] = ip6h->ip6_nxt; 1117 /* 1118 * hop-by-hop extension header length in 8-byte words, not 1119 * including the 1st 8 bytes of the hop-by-hop header. 1120 */ 1121 ip6hbh[1] = (hbhlen >> 3) - 1; 1122 ip6h->ip6_nxt = IPPROTO_HOPOPTS; 1123 } 1124 /* 1125 * Copy the label option into the hop-by-hop header and insert any 1126 * needed pads 1127 */ 1128 bcopy(optbuf, ip6hbh + 2, rawlen); 1129 if (pad_len == 1) { 1130 pad_position[0] = IP6OPT_PAD1; 1131 } else if (pad_len > 1) { 1132 pad_position[0] = IP6OPT_PADN; 1133 pad_position[1] = pad_len - 2; 1134 if (pad_len > 2) 1135 bzero(pad_position + 2, pad_len - 2); 1136 } 1137 ip6h->ip6_plen = htons(ntohs(ip6h->ip6_plen) + delta); 1138 return (delta); 1139 } 1140 1141 /* 1142 * tsol_check_label_v6() 1143 * 1144 * This routine computes the IP label that should be on the packet based on the 1145 * connection and destination information. It's called only by the IP 1146 * forwarding logic, because all internal modules atop IP know how to generate 1147 * their own labels. 1148 * 1149 * Returns: 1150 * 0 Label on packet was already correct 1151 * EACCESS The packet failed the remote host accreditation. 1152 * ENOMEM Memory allocation failure. 1153 */ 1154 int 1155 tsol_check_label_v6(const cred_t *credp, mblk_t **mpp, int *addedp, 1156 boolean_t isexempt) 1157 { 1158 mblk_t *mp = *mpp; 1159 ip6_t *ip6h; 1160 /* 1161 * Label option length is limited to IP_MAX_OPT_LENGTH for 1162 * symmetry with IPv4. Can be relaxed if needed 1163 */ 1164 uchar_t opt_storage[TSOL_MAX_IPV6_OPTION]; 1165 uint_t hlen; 1166 uint_t sec_opt_len; /* label option length not including type, len */ 1167 int added; 1168 int retv; 1169 uchar_t *after_secopt; 1170 uchar_t *secopt = NULL; 1171 uchar_t *ip6hbh; 1172 uint_t hbhlen; 1173 boolean_t hbh_needed; 1174 1175 if (addedp != NULL) 1176 *addedp = 0; 1177 1178 ip6h = (ip6_t *)mp->b_rptr; 1179 retv = tsol_compute_label_v6(credp, &ip6h->ip6_dst, opt_storage, 1180 isexempt); 1181 if (retv != 0) 1182 return (retv); 1183 1184 sec_opt_len = opt_storage[1]; 1185 1186 if (ip6h->ip6_nxt == IPPROTO_HOPOPTS) { 1187 ip6hbh = (uchar_t *)&ip6h[1]; 1188 hbhlen = (ip6hbh[1] + 1) << 3; 1189 secopt = tsol_find_secopt_v6(ip6hbh, hbhlen, &after_secopt, 1190 &hbh_needed); 1191 } 1192 1193 if (sec_opt_len == 0 && secopt == NULL) { 1194 /* 1195 * The packet is not supposed to have a label, and it 1196 * does not have one currently 1197 */ 1198 return (0); 1199 } 1200 if (secopt != NULL && sec_opt_len != 0 && 1201 (bcmp(opt_storage, secopt, sec_opt_len + 2) == 0)) { 1202 /* The packet has the correct label already */ 1203 return (0); 1204 } 1205 1206 /* 1207 * If there is an option there, then it must be the wrong one; delete. 1208 */ 1209 if (secopt != NULL) 1210 mp->b_wptr += tsol_remove_secopt_v6(ip6h, MBLKL(mp)); 1211 1212 /* 1213 * Make sure we have room for the worst-case addition. Add 2 bytes for 1214 * the hop-by-hop ext header's next header and length fields. Add 1215 * another 2 bytes for the label option type, len and then round 1216 * up to the next 8-byte multiple. 1217 */ 1218 hlen = (4 + sec_opt_len + 7) & ~7; 1219 if (mp->b_wptr + hlen > mp->b_datap->db_lim) { 1220 int copylen; 1221 mblk_t *new_mp; 1222 uint16_t hdr_len; 1223 1224 hdr_len = ip_hdr_length_v6(mp, ip6h); 1225 /* 1226 * Allocate enough to be meaningful, but not *too* much. 1227 * Also all the IPv6 extension headers must be in the same mblk 1228 */ 1229 copylen = MBLKL(mp); 1230 if (copylen > 256) 1231 copylen = 256; 1232 if (copylen < hdr_len) 1233 copylen = hdr_len; 1234 new_mp = allocb(hlen + copylen + 1235 (mp->b_rptr - mp->b_datap->db_base), BPRI_HI); 1236 if (new_mp == NULL) 1237 return (ENOMEM); 1238 mblk_setcred(new_mp, DB_CRED(mp)); 1239 1240 /* keep the bias */ 1241 new_mp->b_rptr += mp->b_rptr - mp->b_datap->db_base; 1242 new_mp->b_wptr = new_mp->b_rptr + copylen; 1243 bcopy(mp->b_rptr, new_mp->b_rptr, copylen); 1244 new_mp->b_cont = mp; 1245 if ((mp->b_rptr += copylen) >= mp->b_wptr) { 1246 new_mp->b_cont = mp->b_cont; 1247 freeb(mp); 1248 } 1249 *mpp = mp = new_mp; 1250 ip6h = (ip6_t *)mp->b_rptr; 1251 } 1252 1253 added = tsol_prepend_option_v6(opt_storage, ip6h, MBLKL(mp)); 1254 if (added == -1) 1255 goto param_prob; 1256 1257 if (addedp != NULL) 1258 *addedp = added; 1259 1260 ASSERT(mp->b_wptr + added <= DB_LIM(mp)); 1261 mp->b_wptr += added; 1262 1263 return (0); 1264 1265 param_prob: 1266 return (EINVAL); 1267 } 1268 1269 /* 1270 * Update the given IPv6 "sticky options" structure to contain the provided 1271 * label, which is encoded as an IPv6 option. Existing label is removed if 1272 * necessary, and storage is allocated/freed/resized. 1273 * 1274 * Returns 0 on success, errno on failure. 1275 */ 1276 int 1277 tsol_update_sticky(ip6_pkt_t *ipp, uint_t *labellen, const uchar_t *labelopt) 1278 { 1279 int rawlen, optlen, newlen; 1280 uchar_t *newopts; 1281 1282 /* 1283 * rawlen is the size of the IPv6 label to be inserted from labelopt. 1284 * optlen is the total length of that option, including any necessary 1285 * headers and padding. newlen is the new size of the total hop-by-hop 1286 * options buffer, including user options. 1287 */ 1288 ASSERT(*labellen <= ipp->ipp_hopoptslen); 1289 ASSERT((ipp->ipp_hopopts == NULL && ipp->ipp_hopoptslen == 0) || 1290 (ipp->ipp_hopopts != NULL && ipp->ipp_hopoptslen != 0)); 1291 1292 if ((rawlen = labelopt[1]) != 0) { 1293 rawlen += 2; /* add in header size */ 1294 optlen = (2 + rawlen + 7) & ~7; 1295 } else { 1296 optlen = 0; 1297 } 1298 newlen = ipp->ipp_hopoptslen + optlen - *labellen; 1299 if (newlen == 0 && ipp->ipp_hopopts != NULL) { 1300 /* Deleting all existing hop-by-hop options */ 1301 kmem_free(ipp->ipp_hopopts, ipp->ipp_hopoptslen); 1302 ipp->ipp_hopopts = NULL; 1303 ipp->ipp_fields &= ~IPPF_HOPOPTS; 1304 } else if (optlen != *labellen) { 1305 /* If the label not same size as last time, then reallocate */ 1306 if (newlen > IP6_MAX_OPT_LENGTH) 1307 return (EHOSTUNREACH); 1308 newopts = kmem_alloc(newlen, KM_NOSLEEP); 1309 if (newopts == NULL) 1310 return (ENOMEM); 1311 /* 1312 * If the user has hop-by-hop stickyoptions set, then copy his 1313 * options in after the security label. 1314 */ 1315 if (ipp->ipp_hopoptslen > *labellen) { 1316 bcopy(ipp->ipp_hopopts + *labellen, newopts + optlen, 1317 ipp->ipp_hopoptslen - *labellen); 1318 /* 1319 * Stomp out any header gunk here - this was the 1320 * previous next-header and option length field. 1321 */ 1322 newopts[optlen] = IP6OPT_PADN; 1323 newopts[optlen + 1] = 0; 1324 } 1325 if (ipp->ipp_hopopts != NULL) 1326 kmem_free(ipp->ipp_hopopts, ipp->ipp_hopoptslen); 1327 ipp->ipp_hopopts = (ip6_hbh_t *)newopts; 1328 } 1329 ipp->ipp_hopoptslen = newlen; 1330 *labellen = optlen; 1331 1332 newopts = (uchar_t *)ipp->ipp_hopopts; 1333 1334 /* If there are any options, then fix up reported length */ 1335 if (newlen > 0) { 1336 newopts[1] = (newlen + 7) / 8 - 1; 1337 ipp->ipp_fields |= IPPF_HOPOPTS; 1338 } 1339 1340 /* If there's a label, then insert it now */ 1341 if (optlen > 0) { 1342 /* skip next-header and length fields */ 1343 newopts += 2; 1344 bcopy(labelopt, newopts, rawlen); 1345 newopts += rawlen; 1346 /* make sure padding comes out right */ 1347 optlen -= 2 + rawlen; 1348 if (optlen == 1) { 1349 newopts[0] = IP6OPT_PAD1; 1350 } else if (optlen > 1) { 1351 newopts[0] = IP6OPT_PADN; 1352 optlen -= 2; 1353 newopts[1] = optlen; 1354 if (optlen > 0) 1355 bzero(newopts + 2, optlen); 1356 } 1357 } 1358 return (0); 1359 } 1360 1361 int 1362 tsol_update_options(uchar_t **opts, uint_t *totlen, uint_t *labellen, 1363 const uchar_t *labelopt) 1364 { 1365 int optlen, newlen; 1366 uchar_t *newopts; 1367 1368 optlen = (labelopt[IPOPT_OLEN] + 3) & ~3; 1369 newlen = *totlen + optlen - *labellen; 1370 if (optlen > *labellen) { 1371 if (newlen > IP_MAX_OPT_LENGTH) 1372 return (EHOSTUNREACH); 1373 newopts = (uchar_t *)mi_alloc(newlen, BPRI_HI); 1374 if (newopts == NULL) 1375 return (ENOMEM); 1376 if (*totlen > *labellen) { 1377 bcopy(*opts + *labellen, newopts + optlen, 1378 *totlen - *labellen); 1379 } 1380 if (*opts != NULL) 1381 mi_free((char *)*opts); 1382 *opts = newopts; 1383 } else if (optlen < *labellen) { 1384 if (newlen == 0 && *opts != NULL) { 1385 mi_free((char *)*opts); 1386 *opts = NULL; 1387 } 1388 if (*totlen > *labellen) { 1389 ovbcopy(*opts + *labellen, *opts + optlen, 1390 *totlen - *labellen); 1391 } 1392 } 1393 *totlen = newlen; 1394 *labellen = optlen; 1395 if (optlen > 0) { 1396 newopts = *opts; 1397 bcopy(labelopt, newopts, optlen); 1398 /* check if there are user-supplied options that follow */ 1399 if (optlen < newlen) { 1400 /* compute amount of embedded alignment needed */ 1401 optlen -= newopts[IPOPT_OLEN]; 1402 newopts += newopts[IPOPT_OLEN]; 1403 while (--optlen >= 0) 1404 *newopts++ = IPOPT_NOP; 1405 } else if (optlen != newopts[IPOPT_OLEN]) { 1406 /* 1407 * The label option is the only option and it is 1408 * not a multiple of 4 bytes. 1409 */ 1410 optlen -= newopts[IPOPT_OLEN]; 1411 newopts += newopts[IPOPT_OLEN]; 1412 while (--optlen >= 0) 1413 *newopts++ = IPOPT_EOL; 1414 } 1415 } 1416 return (0); 1417 } 1418 1419 /* 1420 * This does the bulk of the processing for setting IPPROTO_IP {T_,}IP_OPTIONS. 1421 */ 1422 boolean_t 1423 tsol_option_set(uchar_t **opts, uint_t *optlen, uint_t labellen, 1424 const uchar_t *useropts, uint_t userlen) 1425 { 1426 int newlen; 1427 uchar_t *newopts; 1428 1429 newlen = userlen + labellen; 1430 if (newlen > *optlen) { 1431 /* need more room */ 1432 newopts = (uchar_t *)mi_alloc(newlen, BPRI_HI); 1433 if (newopts == NULL) 1434 return (B_FALSE); 1435 /* 1436 * The supplied *opts can't be NULL in this case, 1437 * since there's an existing label. 1438 */ 1439 if (labellen > 0) 1440 bcopy(*opts, newopts, labellen); 1441 if (*opts != NULL) 1442 mi_free((char *)*opts); 1443 *opts = newopts; 1444 } 1445 1446 if (newlen == 0) { 1447 /* special case -- no remaining IP options at all */ 1448 if (*opts != NULL) { 1449 mi_free((char *)*opts); 1450 *opts = NULL; 1451 } 1452 } else if (userlen > 0) { 1453 /* merge in the user's options */ 1454 newopts = *opts; 1455 if (labellen > 0) { 1456 int extra = labellen - newopts[IPOPT_OLEN]; 1457 1458 newopts += newopts[IPOPT_OLEN]; 1459 while (--extra >= 0) 1460 *newopts++ = IPOPT_NOP; 1461 } 1462 bcopy(useropts, newopts, userlen); 1463 } 1464 1465 *optlen = newlen; 1466 return (B_TRUE); 1467 } 1468