1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright (c) 2010, Oracle and/or its affiliates. All rights reserved. 24 * Copyright (c) 2015, Joyent, Inc. All rights reserved. 25 */ 26 /* 27 * Copyright 2014 Nexenta Systems, Inc. All rights reserved. 28 */ 29 30 #include <sys/cmn_err.h> 31 #include <sys/strsun.h> 32 #include <sys/sdt.h> 33 #include <sys/mac.h> 34 #include <sys/mac_impl.h> 35 #include <sys/mac_client_impl.h> 36 #include <sys/mac_client_priv.h> 37 #include <sys/ethernet.h> 38 #include <sys/vlan.h> 39 #include <sys/dlpi.h> 40 #include <sys/avl.h> 41 #include <inet/ip.h> 42 #include <inet/ip6.h> 43 #include <inet/arp.h> 44 #include <netinet/arp.h> 45 #include <netinet/udp.h> 46 #include <netinet/dhcp.h> 47 #include <netinet/dhcp6.h> 48 49 /* 50 * Implementation overview for DHCP address detection 51 * 52 * The purpose of DHCP address detection is to relieve the user of having to 53 * manually configure static IP addresses when ip-nospoof protection is turned 54 * on. To achieve this, the mac layer needs to intercept DHCP packets to 55 * determine the assigned IP addresses. 56 * 57 * A DHCP handshake between client and server typically requires at least 58 * 4 messages: 59 * 60 * 1. DISCOVER - client attempts to locate DHCP servers via a 61 * broadcast message to its subnet. 62 * 2. OFFER - server responds to client with an IP address and 63 * other parameters. 64 * 3. REQUEST - client requests the offered address. 65 * 4. ACK - server verifies that the requested address matches 66 * the one it offered. 67 * 68 * DHCPv6 behaves pretty much the same way aside from different message names. 69 * 70 * Address information is embedded in either the OFFER or REQUEST message. 71 * We chose to intercept REQUEST because this is at the last part of the 72 * handshake and it indicates that the client intends to keep the address. 73 * Intercepting OFFERs is unreliable because the client may receive multiple 74 * offers from different servers, and we can't tell which address the client 75 * will keep. 76 * 77 * Each DHCP message has a transaction ID. We use this transaction ID to match 78 * REQUESTs with ACKs received from servers. 79 * 80 * For IPv4, the process to acquire a DHCP-assigned address is as follows: 81 * 82 * 1. Client sends REQUEST. a new dhcpv4_txn_t object is created and inserted 83 * in the the mci_v4_pending_txn table (keyed by xid). This object represents 84 * a new transaction. It contains the xid, the client ID and requested IP 85 * address. 86 * 87 * 2. Server responds with an ACK. The xid from this ACK is used to lookup the 88 * pending transaction from the mci_v4_pending_txn table. Once the object is 89 * found, it is removed from the pending table and inserted into the 90 * completed table (mci_v4_completed_txn, keyed by client ID) and the dynamic 91 * IP table (mci_v4_dyn_ip, keyed by IP address). 92 * 93 * 3. An outgoing packet that goes through the ip-nospoof path will be checked 94 * against the dynamic IP table. Packets that have the assigned DHCP address 95 * as the source IP address will pass the check and be admitted onto the 96 * network. 97 * 98 * IPv4 notes: 99 * 100 * If the server never responds with an ACK, there is a timer that is set after 101 * the insertion of the transaction into the pending table. When the timer 102 * fires, it will check whether the transaction is old (by comparing current 103 * time and the txn's timestamp), if so the transaction will be freed. along 104 * with this, any transaction in the completed/dyn-ip tables matching the client 105 * ID of this stale transaction will also be freed. If the client fails to 106 * extend a lease, we want to stop the client from using any IP addresses that 107 * were granted previously. 108 * 109 * A RELEASE message from the client will not cause a transaction to be created. 110 * The client ID in the RELEASE message will be used for finding and removing 111 * transactions in the completed and dyn-ip tables. 112 * 113 * 114 * For IPv6, the process to acquire a DHCPv6-assigned address is as follows: 115 * 116 * 1. Client sends REQUEST. The DUID is extracted and stored into a dhcpv6_cid_t 117 * structure. A new transaction structure (dhcpv6_txn_t) is also created and 118 * it will point to the dhcpv6_cid_t. If an existing transaction with a 119 * matching xid is not found, this dhcpv6_txn_t will be inserted into the 120 * mci_v6_pending_txn table (keyed by xid). 121 * 122 * 2. Server responds with a REPLY. If a pending transaction is found, the 123 * addresses in the reply will be placed into the dhcpv6_cid_t pointed to by 124 * the transaction. The dhcpv6_cid_t will then be moved to the mci_v6_cid 125 * table (keyed by cid). The associated addresses will be added to the 126 * mci_v6_dyn_ip table (while still being pointed to by the dhcpv6_cid_t). 127 * 128 * 3. IPv6 ip-nospoof will now check mci_v6_dyn_ip for matching packets. 129 * Packets with a source address matching one of the DHCPv6-assigned 130 * addresses will be allowed through. 131 * 132 * IPv6 notes: 133 * 134 * The v6 code shares the same timer as v4 for scrubbing stale transactions. 135 * Just like v4, as part of removing an expired transaction, a RELEASE will be 136 * be triggered on the cid associated with the expired transaction. 137 * 138 * The data structures used for v6 are slightly different because a v6 client 139 * may have multiple addresses associated with it. 140 */ 141 142 /* 143 * These are just arbitrary limits meant for preventing abuse (e.g. a user 144 * flooding the network with bogus transactions). They are not meant to be 145 * user-modifiable so they are not exposed as linkprops. 146 */ 147 static ulong_t dhcp_max_pending_txn = 512; 148 static ulong_t dhcp_max_completed_txn = 512; 149 static ulong_t slaac_max_allowed = 512; 150 static hrtime_t txn_cleanup_interval = 60 * NANOSEC; 151 152 /* 153 * DHCPv4 transaction. It may be added to three different tables 154 * (keyed by different fields). 155 */ 156 typedef struct dhcpv4_txn { 157 uint32_t dt_xid; 158 hrtime_t dt_timestamp; 159 uint8_t dt_cid[DHCP_MAX_OPT_SIZE]; 160 uint8_t dt_cid_len; 161 ipaddr_t dt_ipaddr; 162 avl_node_t dt_node; 163 avl_node_t dt_ipnode; 164 struct dhcpv4_txn *dt_next; 165 } dhcpv4_txn_t; 166 167 /* 168 * DHCPv6 address. May be added to mci_v6_dyn_ip. 169 * It is always pointed to by its parent dhcpv6_cid_t structure. 170 */ 171 typedef struct dhcpv6_addr { 172 in6_addr_t da_addr; 173 avl_node_t da_node; 174 struct dhcpv6_addr *da_next; 175 } dhcpv6_addr_t; 176 177 /* 178 * DHCPv6 client ID. May be added to mci_v6_cid. 179 * No dhcpv6_txn_t should be pointing to it after it is added to mci_v6_cid. 180 */ 181 typedef struct dhcpv6_cid { 182 uchar_t *dc_cid; 183 uint_t dc_cid_len; 184 dhcpv6_addr_t *dc_addr; 185 uint_t dc_addrcnt; 186 avl_node_t dc_node; 187 } dhcpv6_cid_t; 188 189 /* 190 * DHCPv6 transaction. Unlike its v4 counterpart, this object gets freed up 191 * as soon as the transaction completes or expires. 192 */ 193 typedef struct dhcpv6_txn { 194 uint32_t dt_xid; 195 hrtime_t dt_timestamp; 196 dhcpv6_cid_t *dt_cid; 197 avl_node_t dt_node; 198 struct dhcpv6_txn *dt_next; 199 } dhcpv6_txn_t; 200 201 /* 202 * Stateless address autoconfiguration (SLAAC) address. May be added to 203 * mci_v6_slaac_ip. 204 */ 205 typedef struct slaac_addr { 206 in6_addr_t sla_prefix; 207 in6_addr_t sla_addr; 208 avl_node_t sla_node; 209 } slaac_addr_t; 210 211 static void start_txn_cleanup_timer(mac_client_impl_t *); 212 static boolean_t allowed_ips_set(mac_resource_props_t *, uint32_t); 213 214 #define BUMP_STAT(m, s) (m)->mci_misc_stat.mms_##s++ 215 216 /* 217 * Comparison functions for the 3 AVL trees used: 218 * mci_v4_pending_txn, mci_v4_completed_txn, mci_v4_dyn_ip 219 */ 220 static int 221 compare_dhcpv4_xid(const void *arg1, const void *arg2) 222 { 223 const dhcpv4_txn_t *txn1 = arg1, *txn2 = arg2; 224 225 if (txn1->dt_xid < txn2->dt_xid) 226 return (-1); 227 else if (txn1->dt_xid > txn2->dt_xid) 228 return (1); 229 else 230 return (0); 231 } 232 233 static int 234 compare_dhcpv4_cid(const void *arg1, const void *arg2) 235 { 236 const dhcpv4_txn_t *txn1 = arg1, *txn2 = arg2; 237 int ret; 238 239 if (txn1->dt_cid_len < txn2->dt_cid_len) 240 return (-1); 241 else if (txn1->dt_cid_len > txn2->dt_cid_len) 242 return (1); 243 244 if (txn1->dt_cid_len == 0) 245 return (0); 246 247 ret = memcmp(txn1->dt_cid, txn2->dt_cid, txn1->dt_cid_len); 248 if (ret < 0) 249 return (-1); 250 else if (ret > 0) 251 return (1); 252 else 253 return (0); 254 } 255 256 static int 257 compare_dhcpv4_ip(const void *arg1, const void *arg2) 258 { 259 const dhcpv4_txn_t *txn1 = arg1, *txn2 = arg2; 260 261 if (txn1->dt_ipaddr < txn2->dt_ipaddr) 262 return (-1); 263 else if (txn1->dt_ipaddr > txn2->dt_ipaddr) 264 return (1); 265 else 266 return (0); 267 } 268 269 /* 270 * Find the specified DHCPv4 option. 271 */ 272 static int 273 get_dhcpv4_option(struct dhcp *dh4, uchar_t *end, uint8_t type, 274 uchar_t **opt, uint8_t *opt_len) 275 { 276 uchar_t *start = (uchar_t *)dh4->options; 277 uint8_t otype, olen; 278 279 while (start < end) { 280 if (*start == CD_PAD) { 281 start++; 282 continue; 283 } 284 if (*start == CD_END) 285 break; 286 287 otype = *start++; 288 olen = *start++; 289 if (otype == type && olen > 0) { 290 *opt = start; 291 *opt_len = olen; 292 return (0); 293 } 294 start += olen; 295 } 296 return (ENOENT); 297 } 298 299 /* 300 * Locate the start of a DHCPv4 header. 301 * The possible return values and associated meanings are: 302 * 0 - packet is DHCP and has a DHCP header. 303 * EINVAL - packet is not DHCP. the recommended action is to let it pass. 304 * ENOSPC - packet is a initial fragment that is DHCP or is unidentifiable. 305 * the recommended action is to drop it. 306 */ 307 static int 308 get_dhcpv4_info(ipha_t *ipha, uchar_t *end, struct dhcp **dh4) 309 { 310 uint16_t offset_and_flags, client, server; 311 boolean_t first_frag = B_FALSE; 312 struct udphdr *udph; 313 uchar_t *dh; 314 315 if (ipha->ipha_protocol != IPPROTO_UDP) 316 return (EINVAL); 317 318 offset_and_flags = ntohs(ipha->ipha_fragment_offset_and_flags); 319 if ((offset_and_flags & (IPH_MF | IPH_OFFSET)) != 0) { 320 /* 321 * All non-initial fragments may pass because we cannot 322 * identify their type. It's safe to let them through 323 * because reassembly will fail if we decide to drop the 324 * initial fragment. 325 */ 326 if (((offset_and_flags << 3) & 0xffff) != 0) 327 return (EINVAL); 328 first_frag = B_TRUE; 329 } 330 /* drop packets without a udp header */ 331 udph = (struct udphdr *)((uchar_t *)ipha + IPH_HDR_LENGTH(ipha)); 332 if ((uchar_t *)&udph[1] > end) 333 return (ENOSPC); 334 335 client = htons(IPPORT_BOOTPC); 336 server = htons(IPPORT_BOOTPS); 337 if (udph->uh_sport != client && udph->uh_sport != server && 338 udph->uh_dport != client && udph->uh_dport != server) 339 return (EINVAL); 340 341 /* drop dhcp fragments */ 342 if (first_frag) 343 return (ENOSPC); 344 345 dh = (uchar_t *)&udph[1]; 346 if (dh + BASE_PKT_SIZE > end) 347 return (EINVAL); 348 349 *dh4 = (struct dhcp *)dh; 350 return (0); 351 } 352 353 /* 354 * Wrappers for accesses to avl trees to improve readability. 355 * Their purposes are fairly self-explanatory. 356 */ 357 static dhcpv4_txn_t * 358 find_dhcpv4_pending_txn(mac_client_impl_t *mcip, uint32_t xid) 359 { 360 dhcpv4_txn_t tmp_txn; 361 362 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 363 tmp_txn.dt_xid = xid; 364 return (avl_find(&mcip->mci_v4_pending_txn, &tmp_txn, NULL)); 365 } 366 367 static int 368 insert_dhcpv4_pending_txn(mac_client_impl_t *mcip, dhcpv4_txn_t *txn) 369 { 370 avl_index_t where; 371 372 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 373 if (avl_find(&mcip->mci_v4_pending_txn, txn, &where) != NULL) 374 return (EEXIST); 375 376 if (avl_numnodes(&mcip->mci_v4_pending_txn) >= dhcp_max_pending_txn) { 377 BUMP_STAT(mcip, dhcpdropped); 378 return (EAGAIN); 379 } 380 avl_insert(&mcip->mci_v4_pending_txn, txn, where); 381 return (0); 382 } 383 384 static void 385 remove_dhcpv4_pending_txn(mac_client_impl_t *mcip, dhcpv4_txn_t *txn) 386 { 387 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 388 avl_remove(&mcip->mci_v4_pending_txn, txn); 389 } 390 391 static dhcpv4_txn_t * 392 find_dhcpv4_completed_txn(mac_client_impl_t *mcip, uint8_t *cid, 393 uint8_t cid_len) 394 { 395 dhcpv4_txn_t tmp_txn; 396 397 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 398 if (cid_len > 0) 399 bcopy(cid, tmp_txn.dt_cid, cid_len); 400 tmp_txn.dt_cid_len = cid_len; 401 return (avl_find(&mcip->mci_v4_completed_txn, &tmp_txn, NULL)); 402 } 403 404 /* 405 * After a pending txn is removed from the pending table, it is inserted 406 * into both the completed and dyn-ip tables. These two insertions are 407 * done together because a client ID must have 1:1 correspondence with 408 * an IP address and IP addresses must be unique in the dyn-ip table. 409 */ 410 static int 411 insert_dhcpv4_completed_txn(mac_client_impl_t *mcip, dhcpv4_txn_t *txn) 412 { 413 avl_index_t where; 414 415 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 416 if (avl_find(&mcip->mci_v4_completed_txn, txn, &where) != NULL) 417 return (EEXIST); 418 419 if (avl_numnodes(&mcip->mci_v4_completed_txn) >= 420 dhcp_max_completed_txn) { 421 BUMP_STAT(mcip, dhcpdropped); 422 return (EAGAIN); 423 } 424 425 avl_insert(&mcip->mci_v4_completed_txn, txn, where); 426 if (avl_find(&mcip->mci_v4_dyn_ip, txn, &where) != NULL) { 427 avl_remove(&mcip->mci_v4_completed_txn, txn); 428 return (EEXIST); 429 } 430 avl_insert(&mcip->mci_v4_dyn_ip, txn, where); 431 return (0); 432 } 433 434 static void 435 remove_dhcpv4_completed_txn(mac_client_impl_t *mcip, dhcpv4_txn_t *txn) 436 { 437 dhcpv4_txn_t *ctxn; 438 439 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 440 if ((ctxn = avl_find(&mcip->mci_v4_dyn_ip, txn, NULL)) != NULL && 441 ctxn == txn) 442 avl_remove(&mcip->mci_v4_dyn_ip, txn); 443 444 avl_remove(&mcip->mci_v4_completed_txn, txn); 445 } 446 447 /* 448 * Check whether an IP address is in the dyn-ip table. 449 */ 450 static boolean_t 451 check_dhcpv4_dyn_ip(mac_client_impl_t *mcip, ipaddr_t ipaddr) 452 { 453 dhcpv4_txn_t tmp_txn, *txn; 454 455 mutex_enter(&mcip->mci_protect_lock); 456 tmp_txn.dt_ipaddr = ipaddr; 457 txn = avl_find(&mcip->mci_v4_dyn_ip, &tmp_txn, NULL); 458 mutex_exit(&mcip->mci_protect_lock); 459 return (txn != NULL); 460 } 461 462 /* 463 * Create/destroy a DHCPv4 transaction. 464 */ 465 static dhcpv4_txn_t * 466 create_dhcpv4_txn(uint32_t xid, uint8_t *cid, uint8_t cid_len, ipaddr_t ipaddr) 467 { 468 dhcpv4_txn_t *txn; 469 470 if ((txn = kmem_zalloc(sizeof (*txn), KM_NOSLEEP)) == NULL) 471 return (NULL); 472 473 txn->dt_xid = xid; 474 txn->dt_timestamp = gethrtime(); 475 if (cid_len > 0) 476 bcopy(cid, &txn->dt_cid, cid_len); 477 txn->dt_cid_len = cid_len; 478 txn->dt_ipaddr = ipaddr; 479 return (txn); 480 } 481 482 static void 483 free_dhcpv4_txn(dhcpv4_txn_t *txn) 484 { 485 kmem_free(txn, sizeof (*txn)); 486 } 487 488 /* 489 * Clean up all v4 tables. 490 */ 491 static void 492 flush_dhcpv4(mac_client_impl_t *mcip) 493 { 494 void *cookie = NULL; 495 dhcpv4_txn_t *txn; 496 497 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 498 while ((txn = avl_destroy_nodes(&mcip->mci_v4_dyn_ip, 499 &cookie)) != NULL) { 500 /* 501 * No freeing needed here because the same txn exists 502 * in the mci_v4_completed_txn table as well. 503 */ 504 } 505 cookie = NULL; 506 while ((txn = avl_destroy_nodes(&mcip->mci_v4_completed_txn, 507 &cookie)) != NULL) { 508 free_dhcpv4_txn(txn); 509 } 510 cookie = NULL; 511 while ((txn = avl_destroy_nodes(&mcip->mci_v4_pending_txn, 512 &cookie)) != NULL) { 513 free_dhcpv4_txn(txn); 514 } 515 } 516 517 /* 518 * Cleanup stale DHCPv4 transactions. 519 */ 520 static void 521 txn_cleanup_v4(mac_client_impl_t *mcip) 522 { 523 dhcpv4_txn_t *txn, *ctxn, *next, *txn_list = NULL; 524 525 /* 526 * Find stale pending transactions and place them on a list 527 * to be removed. 528 */ 529 for (txn = avl_first(&mcip->mci_v4_pending_txn); txn != NULL; 530 txn = avl_walk(&mcip->mci_v4_pending_txn, txn, AVL_AFTER)) { 531 if (gethrtime() - txn->dt_timestamp > txn_cleanup_interval) { 532 DTRACE_PROBE2(found__expired__txn, 533 mac_client_impl_t *, mcip, 534 dhcpv4_txn_t *, txn); 535 536 txn->dt_next = txn_list; 537 txn_list = txn; 538 } 539 } 540 541 /* 542 * Remove and free stale pending transactions and completed 543 * transactions with the same client IDs as the stale transactions. 544 */ 545 for (txn = txn_list; txn != NULL; txn = next) { 546 avl_remove(&mcip->mci_v4_pending_txn, txn); 547 548 ctxn = find_dhcpv4_completed_txn(mcip, txn->dt_cid, 549 txn->dt_cid_len); 550 if (ctxn != NULL) { 551 DTRACE_PROBE2(removing__completed__txn, 552 mac_client_impl_t *, mcip, 553 dhcpv4_txn_t *, ctxn); 554 555 remove_dhcpv4_completed_txn(mcip, ctxn); 556 free_dhcpv4_txn(ctxn); 557 } 558 next = txn->dt_next; 559 txn->dt_next = NULL; 560 561 DTRACE_PROBE2(freeing__txn, mac_client_impl_t *, mcip, 562 dhcpv4_txn_t *, txn); 563 free_dhcpv4_txn(txn); 564 } 565 } 566 567 /* 568 * Core logic for intercepting outbound DHCPv4 packets. 569 */ 570 static boolean_t 571 intercept_dhcpv4_outbound(mac_client_impl_t *mcip, ipha_t *ipha, uchar_t *end) 572 { 573 struct dhcp *dh4; 574 uchar_t *opt; 575 dhcpv4_txn_t *txn, *ctxn; 576 ipaddr_t ipaddr; 577 uint8_t opt_len, mtype, cid[DHCP_MAX_OPT_SIZE], cid_len; 578 mac_resource_props_t *mrp = MCIP_RESOURCE_PROPS(mcip); 579 580 if (get_dhcpv4_info(ipha, end, &dh4) != 0) 581 return (B_TRUE); 582 583 /* ip_nospoof/allowed-ips and DHCP are mutually exclusive by default */ 584 if (allowed_ips_set(mrp, IPV4_VERSION)) 585 return (B_FALSE); 586 587 if (get_dhcpv4_option(dh4, end, CD_DHCP_TYPE, &opt, &opt_len) != 0 || 588 opt_len != 1) { 589 DTRACE_PROBE2(mtype__not__found, mac_client_impl_t *, mcip, 590 struct dhcp *, dh4); 591 return (B_TRUE); 592 } 593 mtype = *opt; 594 if (mtype != REQUEST && mtype != RELEASE) { 595 DTRACE_PROBE3(ignored__mtype, mac_client_impl_t *, mcip, 596 struct dhcp *, dh4, uint8_t, mtype); 597 return (B_TRUE); 598 } 599 600 /* client ID is optional for IPv4 */ 601 if (get_dhcpv4_option(dh4, end, CD_CLIENT_ID, &opt, &opt_len) == 0 && 602 opt_len >= 2) { 603 bcopy(opt, cid, opt_len); 604 cid_len = opt_len; 605 } else { 606 bzero(cid, DHCP_MAX_OPT_SIZE); 607 cid_len = 0; 608 } 609 610 mutex_enter(&mcip->mci_protect_lock); 611 if (mtype == RELEASE) { 612 DTRACE_PROBE2(release, mac_client_impl_t *, mcip, 613 struct dhcp *, dh4); 614 615 /* flush any completed txn with this cid */ 616 ctxn = find_dhcpv4_completed_txn(mcip, cid, cid_len); 617 if (ctxn != NULL) { 618 DTRACE_PROBE2(release__successful, mac_client_impl_t *, 619 mcip, struct dhcp *, dh4); 620 621 remove_dhcpv4_completed_txn(mcip, ctxn); 622 free_dhcpv4_txn(ctxn); 623 } 624 goto done; 625 } 626 627 /* 628 * If a pending txn already exists, we'll update its timestamp so 629 * it won't get flushed by the timer. We don't need to create new 630 * txns for retransmissions. 631 */ 632 if ((txn = find_dhcpv4_pending_txn(mcip, dh4->xid)) != NULL) { 633 DTRACE_PROBE2(update, mac_client_impl_t *, mcip, 634 dhcpv4_txn_t *, txn); 635 txn->dt_timestamp = gethrtime(); 636 goto done; 637 } 638 639 if (get_dhcpv4_option(dh4, end, CD_REQUESTED_IP_ADDR, 640 &opt, &opt_len) != 0 || opt_len != sizeof (ipaddr)) { 641 DTRACE_PROBE2(ipaddr__not__found, mac_client_impl_t *, mcip, 642 struct dhcp *, dh4); 643 goto done; 644 } 645 bcopy(opt, &ipaddr, sizeof (ipaddr)); 646 if ((txn = create_dhcpv4_txn(dh4->xid, cid, cid_len, ipaddr)) == NULL) 647 goto done; 648 649 if (insert_dhcpv4_pending_txn(mcip, txn) != 0) { 650 DTRACE_PROBE2(insert__failed, mac_client_impl_t *, mcip, 651 dhcpv4_txn_t *, txn); 652 free_dhcpv4_txn(txn); 653 goto done; 654 } 655 start_txn_cleanup_timer(mcip); 656 657 DTRACE_PROBE2(txn__pending, mac_client_impl_t *, mcip, 658 dhcpv4_txn_t *, txn); 659 660 done: 661 mutex_exit(&mcip->mci_protect_lock); 662 return (B_TRUE); 663 } 664 665 /* 666 * Core logic for intercepting inbound DHCPv4 packets. 667 */ 668 static void 669 intercept_dhcpv4_inbound(mac_client_impl_t *mcip, uchar_t *end, 670 struct dhcp *dh4) 671 { 672 uchar_t *opt; 673 dhcpv4_txn_t *txn, *ctxn; 674 uint8_t opt_len, mtype; 675 676 if (get_dhcpv4_option(dh4, end, CD_DHCP_TYPE, &opt, &opt_len) != 0 || 677 opt_len != 1) { 678 DTRACE_PROBE2(mtype__not__found, mac_client_impl_t *, mcip, 679 struct dhcp *, dh4); 680 return; 681 } 682 mtype = *opt; 683 if (mtype != ACK && mtype != NAK) { 684 DTRACE_PROBE3(ignored__mtype, mac_client_impl_t *, mcip, 685 struct dhcp *, dh4, uint8_t, mtype); 686 return; 687 } 688 689 mutex_enter(&mcip->mci_protect_lock); 690 if ((txn = find_dhcpv4_pending_txn(mcip, dh4->xid)) == NULL) { 691 DTRACE_PROBE2(txn__not__found, mac_client_impl_t *, mcip, 692 struct dhcp *, dh4); 693 goto done; 694 } 695 remove_dhcpv4_pending_txn(mcip, txn); 696 697 /* 698 * We're about to move a txn from the pending table to the completed/ 699 * dyn-ip tables. If there is an existing completed txn with the 700 * same cid as our txn, we need to remove and free it. 701 */ 702 ctxn = find_dhcpv4_completed_txn(mcip, txn->dt_cid, txn->dt_cid_len); 703 if (ctxn != NULL) { 704 DTRACE_PROBE2(replacing__old__txn, mac_client_impl_t *, mcip, 705 dhcpv4_txn_t *, ctxn); 706 remove_dhcpv4_completed_txn(mcip, ctxn); 707 free_dhcpv4_txn(ctxn); 708 } 709 if (mtype == NAK) { 710 DTRACE_PROBE2(nak__received, mac_client_impl_t *, mcip, 711 dhcpv4_txn_t *, txn); 712 free_dhcpv4_txn(txn); 713 goto done; 714 } 715 if (insert_dhcpv4_completed_txn(mcip, txn) != 0) { 716 DTRACE_PROBE2(insert__failed, mac_client_impl_t *, mcip, 717 dhcpv4_txn_t *, txn); 718 free_dhcpv4_txn(txn); 719 goto done; 720 } 721 DTRACE_PROBE2(txn__completed, mac_client_impl_t *, mcip, 722 dhcpv4_txn_t *, txn); 723 724 done: 725 mutex_exit(&mcip->mci_protect_lock); 726 } 727 728 729 /* 730 * Comparison functions for the DHCPv6 AVL trees. 731 */ 732 static int 733 compare_dhcpv6_xid(const void *arg1, const void *arg2) 734 { 735 const dhcpv6_txn_t *txn1 = arg1, *txn2 = arg2; 736 737 if (txn1->dt_xid < txn2->dt_xid) 738 return (-1); 739 else if (txn1->dt_xid > txn2->dt_xid) 740 return (1); 741 else 742 return (0); 743 } 744 745 static int 746 compare_dhcpv6_ip(const void *arg1, const void *arg2) 747 { 748 const dhcpv6_addr_t *ip1 = arg1, *ip2 = arg2; 749 int ret; 750 751 ret = memcmp(&ip1->da_addr, &ip2->da_addr, sizeof (in6_addr_t)); 752 if (ret < 0) 753 return (-1); 754 else if (ret > 0) 755 return (1); 756 else 757 return (0); 758 } 759 760 static int 761 compare_dhcpv6_cid(const void *arg1, const void *arg2) 762 { 763 const dhcpv6_cid_t *cid1 = arg1, *cid2 = arg2; 764 int ret; 765 766 if (cid1->dc_cid_len < cid2->dc_cid_len) 767 return (-1); 768 else if (cid1->dc_cid_len > cid2->dc_cid_len) 769 return (1); 770 771 if (cid1->dc_cid_len == 0) 772 return (0); 773 774 ret = memcmp(cid1->dc_cid, cid2->dc_cid, cid1->dc_cid_len); 775 if (ret < 0) 776 return (-1); 777 else if (ret > 0) 778 return (1); 779 else 780 return (0); 781 } 782 783 static int 784 compare_slaac_ip(const void *arg1, const void *arg2) 785 { 786 const slaac_addr_t *ip1 = arg1, *ip2 = arg2; 787 int ret; 788 789 ret = memcmp(&ip1->sla_addr, &ip2->sla_addr, sizeof (in6_addr_t)); 790 if (ret < 0) 791 return (-1); 792 else if (ret > 0) 793 return (1); 794 else 795 return (0); 796 } 797 798 /* 799 * Locate the start of a DHCPv6 header. 800 * The possible return values and associated meanings are: 801 * 0 - packet is DHCP and has a DHCP header. 802 * EINVAL - packet is not DHCP. the recommended action is to let it pass. 803 * ENOSPC - packet is a initial fragment that is DHCP or is unidentifiable. 804 * the recommended action is to drop it. 805 */ 806 static int 807 get_dhcpv6_info(ip6_t *ip6h, uchar_t *end, dhcpv6_message_t **dh6) 808 { 809 uint16_t hdrlen, client, server; 810 boolean_t first_frag = B_FALSE; 811 ip6_frag_t *frag = NULL; 812 uint8_t proto; 813 struct udphdr *udph; 814 uchar_t *dh; 815 816 if (!mac_ip_hdr_length_v6(ip6h, end, &hdrlen, &proto, &frag)) 817 return (ENOSPC); 818 819 if (proto != IPPROTO_UDP) 820 return (EINVAL); 821 822 if (frag != NULL) { 823 /* 824 * All non-initial fragments may pass because we cannot 825 * identify their type. It's safe to let them through 826 * because reassembly will fail if we decide to drop the 827 * initial fragment. 828 */ 829 if ((ntohs(frag->ip6f_offlg) & ~7) != 0) 830 return (EINVAL); 831 first_frag = B_TRUE; 832 } 833 /* drop packets without a udp header */ 834 udph = (struct udphdr *)((uchar_t *)ip6h + hdrlen); 835 if ((uchar_t *)&udph[1] > end) 836 return (ENOSPC); 837 838 client = htons(IPPORT_DHCPV6C); 839 server = htons(IPPORT_DHCPV6S); 840 if (udph->uh_sport != client && udph->uh_sport != server && 841 udph->uh_dport != client && udph->uh_dport != server) 842 return (EINVAL); 843 844 /* drop dhcp fragments */ 845 if (first_frag) 846 return (ENOSPC); 847 848 dh = (uchar_t *)&udph[1]; 849 if (dh + sizeof (dhcpv6_message_t) > end) 850 return (EINVAL); 851 852 *dh6 = (dhcpv6_message_t *)dh; 853 return (0); 854 } 855 856 static int 857 get_ra_info(ip6_t *ip6h, uchar_t *end, nd_router_advert_t **ra) 858 { 859 uint16_t hdrlen; 860 ip6_frag_t *frag = NULL; 861 uint8_t proto; 862 uchar_t *hdrp; 863 struct icmp6_hdr *icmp; 864 865 if (!mac_ip_hdr_length_v6(ip6h, end, &hdrlen, &proto, &frag)) 866 return (ENOSPC); 867 868 if (proto != IPPROTO_ICMPV6) 869 return (EINVAL); 870 871 if (frag != NULL) { 872 /* 873 * All non-initial fragments may pass because we cannot 874 * identify their type. It's safe to let them through 875 * because reassembly will fail if we decide to drop the 876 * initial fragment. 877 */ 878 if ((ntohs(frag->ip6f_offlg) & ~7) != 0) 879 return (EINVAL); 880 return (ENOSPC); 881 } 882 883 /* 884 * Ensure that the ICMP header falls w/in packet boundaries, in case 885 * we've received a malicious packet that reports incorrect lengths. 886 */ 887 hdrp = (uchar_t *)ip6h + hdrlen; 888 if ((hdrp + sizeof (struct icmp6_hdr)) > end) { 889 return (EINVAL); 890 } 891 icmp = (struct icmp6_hdr *)hdrp; 892 893 if (icmp->icmp6_type != ND_ROUTER_ADVERT || 894 icmp->icmp6_code != 0) 895 return (EINVAL); 896 897 *ra = (nd_router_advert_t *)icmp; 898 return (0); 899 } 900 901 /* 902 * Find the specified DHCPv6 option. 903 */ 904 static dhcpv6_option_t * 905 get_dhcpv6_option(void *buf, size_t buflen, dhcpv6_option_t *oldopt, 906 uint16_t codenum, uint_t *retlenp) 907 { 908 uchar_t *bp; 909 dhcpv6_option_t d6o; 910 uint_t olen; 911 912 codenum = htons(codenum); 913 bp = buf; 914 while (buflen >= sizeof (dhcpv6_option_t)) { 915 bcopy(bp, &d6o, sizeof (d6o)); 916 olen = ntohs(d6o.d6o_len) + sizeof (d6o); 917 if (olen > buflen) 918 break; 919 if (d6o.d6o_code != codenum || d6o.d6o_len == 0 || 920 (oldopt != NULL && bp <= (uchar_t *)oldopt)) { 921 bp += olen; 922 buflen -= olen; 923 continue; 924 } 925 if (retlenp != NULL) 926 *retlenp = olen; 927 /* LINTED : alignment */ 928 return ((dhcpv6_option_t *)bp); 929 } 930 return (NULL); 931 } 932 933 /* 934 * Get the status code from a reply message. 935 */ 936 static int 937 get_dhcpv6_status(dhcpv6_message_t *dh6, uchar_t *end, uint16_t *status) 938 { 939 dhcpv6_option_t *d6o; 940 uint_t olen; 941 uint16_t s; 942 943 d6o = get_dhcpv6_option(&dh6[1], end - (uchar_t *)&dh6[1], NULL, 944 DHCPV6_OPT_STATUS_CODE, &olen); 945 946 /* Success is implied if status code is missing */ 947 if (d6o == NULL) { 948 *status = DHCPV6_STAT_SUCCESS; 949 return (0); 950 } 951 if ((uchar_t *)d6o + olen > end) 952 return (EINVAL); 953 954 olen -= sizeof (*d6o); 955 if (olen < sizeof (s)) 956 return (EINVAL); 957 958 bcopy(&d6o[1], &s, sizeof (s)); 959 *status = ntohs(s); 960 return (0); 961 } 962 963 /* 964 * Get the addresses from a reply message. 965 */ 966 static int 967 get_dhcpv6_addrs(dhcpv6_message_t *dh6, uchar_t *end, dhcpv6_cid_t *cid) 968 { 969 dhcpv6_option_t *d6o; 970 dhcpv6_addr_t *next; 971 uint_t olen; 972 973 d6o = NULL; 974 while ((d6o = get_dhcpv6_option(&dh6[1], end - (uchar_t *)&dh6[1], 975 d6o, DHCPV6_OPT_IA_NA, &olen)) != NULL) { 976 dhcpv6_option_t *d6so; 977 dhcpv6_iaaddr_t d6ia; 978 dhcpv6_addr_t **addrp; 979 uchar_t *obase; 980 uint_t solen; 981 982 if (olen < sizeof (dhcpv6_ia_na_t) || 983 (uchar_t *)d6o + olen > end) 984 goto fail; 985 986 obase = (uchar_t *)d6o + sizeof (dhcpv6_ia_na_t); 987 olen -= sizeof (dhcpv6_ia_na_t); 988 d6so = NULL; 989 while ((d6so = get_dhcpv6_option(obase, olen, d6so, 990 DHCPV6_OPT_IAADDR, &solen)) != NULL) { 991 if (solen < sizeof (dhcpv6_iaaddr_t) || 992 (uchar_t *)d6so + solen > end) 993 goto fail; 994 995 bcopy(d6so, &d6ia, sizeof (d6ia)); 996 for (addrp = &cid->dc_addr; *addrp != NULL; 997 addrp = &(*addrp)->da_next) { 998 if (bcmp(&(*addrp)->da_addr, &d6ia.d6ia_addr, 999 sizeof (in6_addr_t)) == 0) 1000 goto fail; 1001 } 1002 if ((*addrp = kmem_zalloc(sizeof (dhcpv6_addr_t), 1003 KM_NOSLEEP)) == NULL) 1004 goto fail; 1005 1006 bcopy(&d6ia.d6ia_addr, &(*addrp)->da_addr, 1007 sizeof (in6_addr_t)); 1008 cid->dc_addrcnt++; 1009 } 1010 } 1011 if (cid->dc_addrcnt == 0) 1012 return (ENOENT); 1013 1014 return (0); 1015 1016 fail: 1017 for (; cid->dc_addr != NULL; cid->dc_addr = next) { 1018 next = cid->dc_addr->da_next; 1019 kmem_free(cid->dc_addr, sizeof (dhcpv6_addr_t)); 1020 cid->dc_addrcnt--; 1021 } 1022 ASSERT(cid->dc_addrcnt == 0); 1023 return (EINVAL); 1024 } 1025 1026 /* 1027 * Free a cid. 1028 * Before this gets called the caller must ensure that all the 1029 * addresses are removed from the mci_v6_dyn_ip table. 1030 */ 1031 static void 1032 free_dhcpv6_cid(dhcpv6_cid_t *cid) 1033 { 1034 dhcpv6_addr_t *addr, *next; 1035 uint_t cnt = 0; 1036 1037 kmem_free(cid->dc_cid, cid->dc_cid_len); 1038 for (addr = cid->dc_addr; addr != NULL; addr = next) { 1039 next = addr->da_next; 1040 kmem_free(addr, sizeof (*addr)); 1041 cnt++; 1042 } 1043 ASSERT(cnt == cid->dc_addrcnt); 1044 kmem_free(cid, sizeof (*cid)); 1045 } 1046 1047 /* 1048 * Extract the DUID from a message. The associated addresses will be 1049 * extracted later from the reply message. 1050 */ 1051 static dhcpv6_cid_t * 1052 create_dhcpv6_cid(dhcpv6_message_t *dh6, uchar_t *end) 1053 { 1054 dhcpv6_option_t *d6o; 1055 dhcpv6_cid_t *cid; 1056 uchar_t *rawcid; 1057 uint_t olen, rawcidlen; 1058 1059 d6o = get_dhcpv6_option(&dh6[1], end - (uchar_t *)&dh6[1], NULL, 1060 DHCPV6_OPT_CLIENTID, &olen); 1061 if (d6o == NULL || (uchar_t *)d6o + olen > end) 1062 return (NULL); 1063 1064 rawcidlen = olen - sizeof (*d6o); 1065 if ((rawcid = kmem_zalloc(rawcidlen, KM_NOSLEEP)) == NULL) 1066 return (NULL); 1067 bcopy(d6o + 1, rawcid, rawcidlen); 1068 1069 if ((cid = kmem_zalloc(sizeof (*cid), KM_NOSLEEP)) == NULL) { 1070 kmem_free(rawcid, rawcidlen); 1071 return (NULL); 1072 } 1073 cid->dc_cid = rawcid; 1074 cid->dc_cid_len = rawcidlen; 1075 return (cid); 1076 } 1077 1078 /* 1079 * Remove a cid from mci_v6_cid. The addresses owned by the cid 1080 * are also removed from mci_v6_dyn_ip. 1081 */ 1082 static void 1083 remove_dhcpv6_cid(mac_client_impl_t *mcip, dhcpv6_cid_t *cid) 1084 { 1085 dhcpv6_addr_t *addr, *tmp_addr; 1086 1087 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 1088 avl_remove(&mcip->mci_v6_cid, cid); 1089 for (addr = cid->dc_addr; addr != NULL; addr = addr->da_next) { 1090 tmp_addr = avl_find(&mcip->mci_v6_dyn_ip, addr, NULL); 1091 if (tmp_addr == addr) 1092 avl_remove(&mcip->mci_v6_dyn_ip, addr); 1093 } 1094 } 1095 1096 /* 1097 * Find and remove a matching cid and associated addresses from 1098 * their respective tables. 1099 */ 1100 static void 1101 release_dhcpv6_cid(mac_client_impl_t *mcip, dhcpv6_cid_t *cid) 1102 { 1103 dhcpv6_cid_t *oldcid; 1104 1105 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 1106 if ((oldcid = avl_find(&mcip->mci_v6_cid, cid, NULL)) == NULL) 1107 return; 1108 1109 /* 1110 * Since cid belongs to a pending txn, it can't possibly be in 1111 * mci_v6_cid. Anything that's found must be an existing cid. 1112 */ 1113 ASSERT(oldcid != cid); 1114 remove_dhcpv6_cid(mcip, oldcid); 1115 free_dhcpv6_cid(oldcid); 1116 } 1117 1118 /* 1119 * Insert cid into mci_v6_cid. 1120 */ 1121 static int 1122 insert_dhcpv6_cid(mac_client_impl_t *mcip, dhcpv6_cid_t *cid) 1123 { 1124 avl_index_t where; 1125 dhcpv6_addr_t *addr; 1126 1127 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 1128 if (avl_find(&mcip->mci_v6_cid, cid, &where) != NULL) 1129 return (EEXIST); 1130 1131 if (avl_numnodes(&mcip->mci_v6_cid) >= dhcp_max_completed_txn) { 1132 BUMP_STAT(mcip, dhcpdropped); 1133 return (EAGAIN); 1134 } 1135 avl_insert(&mcip->mci_v6_cid, cid, where); 1136 for (addr = cid->dc_addr; addr != NULL; addr = addr->da_next) { 1137 if (avl_find(&mcip->mci_v6_dyn_ip, addr, &where) != NULL) 1138 goto fail; 1139 1140 avl_insert(&mcip->mci_v6_dyn_ip, addr, where); 1141 } 1142 return (0); 1143 1144 fail: 1145 remove_dhcpv6_cid(mcip, cid); 1146 return (EEXIST); 1147 } 1148 1149 /* 1150 * Check whether an IP address is in the dyn-ip table. 1151 */ 1152 static boolean_t 1153 check_dhcpv6_dyn_ip(mac_client_impl_t *mcip, in6_addr_t *addr) 1154 { 1155 dhcpv6_addr_t tmp_addr, *a; 1156 1157 mutex_enter(&mcip->mci_protect_lock); 1158 bcopy(addr, &tmp_addr.da_addr, sizeof (in6_addr_t)); 1159 a = avl_find(&mcip->mci_v6_dyn_ip, &tmp_addr, NULL); 1160 mutex_exit(&mcip->mci_protect_lock); 1161 return (a != NULL); 1162 } 1163 1164 static dhcpv6_txn_t * 1165 find_dhcpv6_pending_txn(mac_client_impl_t *mcip, uint32_t xid) 1166 { 1167 dhcpv6_txn_t tmp_txn; 1168 1169 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 1170 tmp_txn.dt_xid = xid; 1171 return (avl_find(&mcip->mci_v6_pending_txn, &tmp_txn, NULL)); 1172 } 1173 1174 static void 1175 remove_dhcpv6_pending_txn(mac_client_impl_t *mcip, dhcpv6_txn_t *txn) 1176 { 1177 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 1178 avl_remove(&mcip->mci_v6_pending_txn, txn); 1179 } 1180 1181 static dhcpv6_txn_t * 1182 create_dhcpv6_txn(uint32_t xid, dhcpv6_cid_t *cid) 1183 { 1184 dhcpv6_txn_t *txn; 1185 1186 if ((txn = kmem_zalloc(sizeof (dhcpv6_txn_t), KM_NOSLEEP)) == NULL) 1187 return (NULL); 1188 1189 txn->dt_xid = xid; 1190 txn->dt_cid = cid; 1191 txn->dt_timestamp = gethrtime(); 1192 return (txn); 1193 } 1194 1195 static void 1196 free_dhcpv6_txn(dhcpv6_txn_t *txn) 1197 { 1198 if (txn->dt_cid != NULL) 1199 free_dhcpv6_cid(txn->dt_cid); 1200 kmem_free(txn, sizeof (dhcpv6_txn_t)); 1201 } 1202 1203 static int 1204 insert_dhcpv6_pending_txn(mac_client_impl_t *mcip, dhcpv6_txn_t *txn) 1205 { 1206 avl_index_t where; 1207 1208 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 1209 if (avl_find(&mcip->mci_v6_pending_txn, txn, &where) != NULL) 1210 return (EEXIST); 1211 1212 if (avl_numnodes(&mcip->mci_v6_pending_txn) >= dhcp_max_pending_txn) { 1213 BUMP_STAT(mcip, dhcpdropped); 1214 return (EAGAIN); 1215 } 1216 avl_insert(&mcip->mci_v6_pending_txn, txn, where); 1217 return (0); 1218 } 1219 1220 /* 1221 * Clean up all v6 tables. 1222 */ 1223 static void 1224 flush_dhcpv6(mac_client_impl_t *mcip) 1225 { 1226 void *cookie = NULL; 1227 dhcpv6_cid_t *cid; 1228 dhcpv6_txn_t *txn; 1229 1230 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 1231 while (avl_destroy_nodes(&mcip->mci_v6_dyn_ip, &cookie) != NULL) { 1232 } 1233 cookie = NULL; 1234 while ((cid = avl_destroy_nodes(&mcip->mci_v6_cid, &cookie)) != NULL) { 1235 free_dhcpv6_cid(cid); 1236 } 1237 cookie = NULL; 1238 while ((txn = avl_destroy_nodes(&mcip->mci_v6_pending_txn, 1239 &cookie)) != NULL) { 1240 free_dhcpv6_txn(txn); 1241 } 1242 } 1243 1244 void 1245 flush_slaac(mac_client_impl_t *mcip) 1246 { 1247 void *cookie = NULL; 1248 slaac_addr_t *addr = NULL; 1249 1250 while ((addr = avl_destroy_nodes(&mcip->mci_v6_slaac_ip, &cookie)) != 1251 NULL) { 1252 kmem_free(addr, sizeof (slaac_addr_t)); 1253 } 1254 } 1255 1256 /* 1257 * Cleanup stale DHCPv6 transactions. 1258 */ 1259 static void 1260 txn_cleanup_v6(mac_client_impl_t *mcip) 1261 { 1262 dhcpv6_txn_t *txn, *next, *txn_list = NULL; 1263 1264 /* 1265 * Find stale pending transactions and place them on a list 1266 * to be removed. 1267 */ 1268 for (txn = avl_first(&mcip->mci_v6_pending_txn); txn != NULL; 1269 txn = avl_walk(&mcip->mci_v6_pending_txn, txn, AVL_AFTER)) { 1270 if (gethrtime() - txn->dt_timestamp > txn_cleanup_interval) { 1271 DTRACE_PROBE2(found__expired__txn, 1272 mac_client_impl_t *, mcip, 1273 dhcpv6_txn_t *, txn); 1274 1275 txn->dt_next = txn_list; 1276 txn_list = txn; 1277 } 1278 } 1279 1280 /* 1281 * Remove and free stale pending transactions. 1282 * Release any existing cids matching the stale transactions. 1283 */ 1284 for (txn = txn_list; txn != NULL; txn = next) { 1285 avl_remove(&mcip->mci_v6_pending_txn, txn); 1286 release_dhcpv6_cid(mcip, txn->dt_cid); 1287 next = txn->dt_next; 1288 txn->dt_next = NULL; 1289 1290 DTRACE_PROBE2(freeing__txn, mac_client_impl_t *, mcip, 1291 dhcpv6_txn_t *, txn); 1292 free_dhcpv6_txn(txn); 1293 } 1294 1295 } 1296 1297 /* 1298 * Core logic for intercepting outbound DHCPv6 packets. 1299 */ 1300 static boolean_t 1301 intercept_dhcpv6_outbound(mac_client_impl_t *mcip, ip6_t *ip6h, uchar_t *end) 1302 { 1303 dhcpv6_message_t *dh6; 1304 dhcpv6_txn_t *txn; 1305 dhcpv6_cid_t *cid = NULL; 1306 uint32_t xid; 1307 uint8_t mtype; 1308 mac_resource_props_t *mrp = MCIP_RESOURCE_PROPS(mcip); 1309 1310 if (get_dhcpv6_info(ip6h, end, &dh6) != 0) 1311 return (B_TRUE); 1312 1313 /* ip_nospoof/allowed-ips and DHCP are mutually exclusive by default */ 1314 if (allowed_ips_set(mrp, IPV6_VERSION)) 1315 return (B_FALSE); 1316 1317 /* 1318 * We want to act on packets that result in DHCPv6 Reply messages, or 1319 * on packets that give up an IPv6 address. For example, a Request or 1320 * Solicit (w/ the Rapid Commit option) will cause the server to send a 1321 * Reply, ending the transaction. 1322 */ 1323 mtype = dh6->d6m_msg_type; 1324 if (mtype != DHCPV6_MSG_SOLICIT && mtype != DHCPV6_MSG_REQUEST && 1325 mtype != DHCPV6_MSG_RENEW && mtype != DHCPV6_MSG_REBIND && 1326 mtype != DHCPV6_MSG_RELEASE) 1327 return (B_TRUE); 1328 1329 if ((cid = create_dhcpv6_cid(dh6, end)) == NULL) 1330 return (B_TRUE); 1331 1332 mutex_enter(&mcip->mci_protect_lock); 1333 if (mtype == DHCPV6_MSG_RELEASE) { 1334 release_dhcpv6_cid(mcip, cid); 1335 goto done; 1336 } 1337 xid = DHCPV6_GET_TRANSID(dh6); 1338 if ((txn = find_dhcpv6_pending_txn(mcip, xid)) != NULL) { 1339 DTRACE_PROBE2(update, mac_client_impl_t *, mcip, 1340 dhcpv6_txn_t *, txn); 1341 txn->dt_timestamp = gethrtime(); 1342 goto done; 1343 } 1344 if ((txn = create_dhcpv6_txn(xid, cid)) == NULL) 1345 goto done; 1346 1347 cid = NULL; 1348 if (insert_dhcpv6_pending_txn(mcip, txn) != 0) { 1349 DTRACE_PROBE2(insert__failed, mac_client_impl_t *, mcip, 1350 dhcpv6_txn_t *, txn); 1351 free_dhcpv6_txn(txn); 1352 goto done; 1353 } 1354 start_txn_cleanup_timer(mcip); 1355 1356 DTRACE_PROBE2(txn__pending, mac_client_impl_t *, mcip, 1357 dhcpv6_txn_t *, txn); 1358 1359 done: 1360 if (cid != NULL) 1361 free_dhcpv6_cid(cid); 1362 1363 mutex_exit(&mcip->mci_protect_lock); 1364 return (B_TRUE); 1365 } 1366 1367 /* 1368 * Core logic for intercepting inbound DHCPv6 packets. 1369 */ 1370 static void 1371 intercept_dhcpv6_inbound(mac_client_impl_t *mcip, uchar_t *end, 1372 dhcpv6_message_t *dh6) 1373 { 1374 dhcpv6_txn_t *txn; 1375 uint32_t xid; 1376 uint8_t mtype; 1377 uint16_t status; 1378 1379 mtype = dh6->d6m_msg_type; 1380 if (mtype != DHCPV6_MSG_REPLY) 1381 return; 1382 1383 mutex_enter(&mcip->mci_protect_lock); 1384 xid = DHCPV6_GET_TRANSID(dh6); 1385 if ((txn = find_dhcpv6_pending_txn(mcip, xid)) == NULL) { 1386 DTRACE_PROBE2(txn__not__found, mac_client_impl_t *, mcip, 1387 dhcpv6_message_t *, dh6); 1388 goto done; 1389 } 1390 remove_dhcpv6_pending_txn(mcip, txn); 1391 release_dhcpv6_cid(mcip, txn->dt_cid); 1392 1393 if (get_dhcpv6_status(dh6, end, &status) != 0 || 1394 status != DHCPV6_STAT_SUCCESS) { 1395 DTRACE_PROBE2(error__status, mac_client_impl_t *, mcip, 1396 dhcpv6_txn_t *, txn); 1397 goto done; 1398 } 1399 if (get_dhcpv6_addrs(dh6, end, txn->dt_cid) != 0) { 1400 DTRACE_PROBE2(no__addrs, mac_client_impl_t *, mcip, 1401 dhcpv6_txn_t *, txn); 1402 goto done; 1403 } 1404 if (insert_dhcpv6_cid(mcip, txn->dt_cid) != 0) { 1405 DTRACE_PROBE2(insert__failed, mac_client_impl_t *, mcip, 1406 dhcpv6_txn_t *, txn); 1407 goto done; 1408 } 1409 DTRACE_PROBE2(txn__completed, mac_client_impl_t *, mcip, 1410 dhcpv6_txn_t *, txn); 1411 1412 txn->dt_cid = NULL; 1413 1414 done: 1415 if (txn != NULL) 1416 free_dhcpv6_txn(txn); 1417 mutex_exit(&mcip->mci_protect_lock); 1418 } 1419 1420 /* 1421 * Check whether an IP address is in the SLAAC table. 1422 */ 1423 static boolean_t 1424 check_slaac_ip(mac_client_impl_t *mcip, in6_addr_t *addr) 1425 { 1426 slaac_addr_t tmp_addr, *a; 1427 1428 mutex_enter(&mcip->mci_protect_lock); 1429 bcopy(addr, &tmp_addr.sla_addr, sizeof (in6_addr_t)); 1430 a = avl_find(&mcip->mci_v6_slaac_ip, &tmp_addr, NULL); 1431 mutex_exit(&mcip->mci_protect_lock); 1432 return (a != NULL); 1433 } 1434 1435 static boolean_t 1436 insert_slaac_ip(avl_tree_t *tree, in6_addr_t *token, slaac_addr_t *addr) 1437 { 1438 uint_t i; 1439 avl_index_t where; 1440 in6_addr_t *prefix = &addr->sla_prefix; 1441 in6_addr_t *in6p = &addr->sla_addr; 1442 1443 bcopy(prefix, in6p, sizeof (struct in6_addr)); 1444 1445 for (i = 0; i < 4; i++) { 1446 in6p->s6_addr32[i] = token->s6_addr32[i] | 1447 in6p->s6_addr32[i]; 1448 } 1449 1450 DTRACE_PROBE1(generated__addr, in6_addr_t *, in6p); 1451 1452 if (avl_find(tree, addr, &where) != NULL) 1453 return (B_FALSE); 1454 1455 avl_insert(tree, addr, where); 1456 return (B_TRUE); 1457 } 1458 1459 static void 1460 insert_slaac_prefix(mac_client_impl_t *mcip, nd_opt_prefix_info_t *po) 1461 { 1462 slaac_addr_t *addr = NULL; 1463 in6_addr_t *token = &mcip->mci_v6_mac_token; 1464 1465 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 1466 1467 if (avl_numnodes(&mcip->mci_v6_slaac_ip) >= slaac_max_allowed) { 1468 DTRACE_PROBE(limit__reached); 1469 return; 1470 } 1471 1472 if ((addr = kmem_zalloc(sizeof (slaac_addr_t), 1473 KM_NOSLEEP | KM_NORMALPRI)) == NULL) 1474 return; 1475 1476 bcopy(&po->nd_opt_pi_prefix, &addr->sla_prefix, 1477 sizeof (struct in6_addr)); 1478 1479 if (!insert_slaac_ip(&mcip->mci_v6_slaac_ip, token, addr)) { 1480 kmem_free(addr, sizeof (slaac_addr_t)); 1481 } 1482 } 1483 1484 static void 1485 intercept_prefix_info(mac_client_impl_t *mcip, nd_opt_prefix_info_t *po) 1486 { 1487 if (8 * po->nd_opt_pi_len != sizeof (nd_opt_prefix_info_t)) { 1488 DTRACE_PROBE(invalid__length); 1489 return; 1490 } 1491 1492 if (po->nd_opt_pi_prefix_len > 128) { 1493 DTRACE_PROBE(invalid__plen); 1494 return; 1495 } 1496 1497 if (IN6_IS_ADDR_LINKLOCAL(&po->nd_opt_pi_prefix)) { 1498 DTRACE_PROBE(link__local); 1499 return; 1500 } 1501 1502 if ((po->nd_opt_pi_flags_reserved & ND_OPT_PI_FLAG_AUTO) == 0) 1503 return; 1504 1505 mutex_enter(&mcip->mci_protect_lock); 1506 insert_slaac_prefix(mcip, po); 1507 mutex_exit(&mcip->mci_protect_lock); 1508 } 1509 1510 /* 1511 * If we receive a Router Advertisement carrying prefix information and 1512 * indicating that SLAAC should be performed, then track the prefix. 1513 */ 1514 static void 1515 intercept_ra_inbound(mac_client_impl_t *mcip, ip6_t *ip6h, uchar_t *end, 1516 nd_router_advert_t *ra) 1517 { 1518 struct nd_opt_hdr *opt; 1519 int len, optlen; 1520 1521 if (ip6h->ip6_hlim != 255) { 1522 DTRACE_PROBE1(invalid__hoplimit, uint8_t, ip6h->ip6_hlim); 1523 return; 1524 } 1525 1526 len = ip6h->ip6_plen - sizeof (nd_router_advert_t); 1527 opt = (struct nd_opt_hdr *)&ra[1]; 1528 while (len >= sizeof (struct nd_opt_hdr) && 1529 ((uchar_t *)opt + sizeof (struct nd_opt_hdr)) <= end) { 1530 optlen = opt->nd_opt_len * 8; 1531 1532 if (optlen < sizeof (struct nd_opt_hdr) || 1533 ((uchar_t *)opt + optlen) > end) { 1534 DTRACE_PROBE(invalid__length); 1535 return; 1536 } 1537 1538 if (opt->nd_opt_type == ND_OPT_PREFIX_INFORMATION) { 1539 intercept_prefix_info(mcip, 1540 (nd_opt_prefix_info_t *)opt); 1541 } 1542 1543 opt = (struct nd_opt_hdr *)((char *)opt + optlen); 1544 len -= optlen; 1545 } 1546 } 1547 1548 /* 1549 * Timer for cleaning up stale transactions. 1550 */ 1551 static void 1552 txn_cleanup_timer(void *arg) 1553 { 1554 mac_client_impl_t *mcip = arg; 1555 1556 mutex_enter(&mcip->mci_protect_lock); 1557 if (mcip->mci_txn_cleanup_tid == 0) { 1558 /* do nothing if timer got cancelled */ 1559 mutex_exit(&mcip->mci_protect_lock); 1560 return; 1561 } 1562 mcip->mci_txn_cleanup_tid = 0; 1563 1564 txn_cleanup_v4(mcip); 1565 txn_cleanup_v6(mcip); 1566 1567 /* 1568 * Restart timer if pending transactions still exist. 1569 */ 1570 if (!avl_is_empty(&mcip->mci_v4_pending_txn) || 1571 !avl_is_empty(&mcip->mci_v6_pending_txn)) { 1572 DTRACE_PROBE1(restarting__timer, mac_client_impl_t *, mcip); 1573 1574 mcip->mci_txn_cleanup_tid = timeout(txn_cleanup_timer, mcip, 1575 drv_usectohz(txn_cleanup_interval / (NANOSEC / MICROSEC))); 1576 } 1577 mutex_exit(&mcip->mci_protect_lock); 1578 } 1579 1580 static void 1581 start_txn_cleanup_timer(mac_client_impl_t *mcip) 1582 { 1583 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 1584 if (mcip->mci_txn_cleanup_tid == 0) { 1585 mcip->mci_txn_cleanup_tid = timeout(txn_cleanup_timer, mcip, 1586 drv_usectohz(txn_cleanup_interval / (NANOSEC / MICROSEC))); 1587 } 1588 } 1589 1590 static void 1591 cancel_txn_cleanup_timer(mac_client_impl_t *mcip) 1592 { 1593 timeout_id_t tid; 1594 1595 ASSERT(MUTEX_HELD(&mcip->mci_protect_lock)); 1596 1597 /* 1598 * This needs to be a while loop because the timer could get 1599 * rearmed during untimeout(). 1600 */ 1601 while ((tid = mcip->mci_txn_cleanup_tid) != 0) { 1602 mcip->mci_txn_cleanup_tid = 0; 1603 mutex_exit(&mcip->mci_protect_lock); 1604 (void) untimeout(tid); 1605 mutex_enter(&mcip->mci_protect_lock); 1606 } 1607 } 1608 1609 /* 1610 * Get the start/end pointers of an L3 packet and also do pullup if needed. 1611 * pulled-up packet needs to be freed by the caller. 1612 */ 1613 static int 1614 get_l3_info(mblk_t *mp, size_t hdrsize, uchar_t **start, uchar_t **end, 1615 mblk_t **nmp) 1616 { 1617 uchar_t *s, *e; 1618 mblk_t *newmp = NULL; 1619 1620 /* 1621 * Pullup if necessary but reject packets that do not have 1622 * a proper mac header. 1623 */ 1624 s = mp->b_rptr + hdrsize; 1625 e = mp->b_wptr; 1626 1627 if (s > mp->b_wptr) 1628 return (EINVAL); 1629 1630 if (!OK_32PTR(s) || mp->b_cont != NULL) { 1631 /* 1632 * Temporarily adjust mp->b_rptr to ensure proper 1633 * alignment of IP header in newmp. 1634 */ 1635 DTRACE_PROBE1(pullup__needed, mblk_t *, mp); 1636 1637 mp->b_rptr += hdrsize; 1638 newmp = msgpullup(mp, -1); 1639 mp->b_rptr -= hdrsize; 1640 1641 if (newmp == NULL) 1642 return (ENOMEM); 1643 1644 s = newmp->b_rptr; 1645 e = newmp->b_wptr; 1646 } 1647 1648 *start = s; 1649 *end = e; 1650 *nmp = newmp; 1651 return (0); 1652 } 1653 1654 void 1655 mac_protect_intercept_dynamic_one(mac_client_impl_t *mcip, mblk_t *mp) 1656 { 1657 mac_impl_t *mip = mcip->mci_mip; 1658 uchar_t *start, *end; 1659 mblk_t *nmp = NULL; 1660 mac_header_info_t mhi; 1661 int err; 1662 1663 err = mac_vlan_header_info((mac_handle_t)mip, mp, &mhi); 1664 if (err != 0) { 1665 DTRACE_PROBE2(invalid__header, mac_client_impl_t *, mcip, 1666 mblk_t *, mp); 1667 return; 1668 } 1669 1670 err = get_l3_info(mp, mhi.mhi_hdrsize, &start, &end, &nmp); 1671 if (err != 0) { 1672 DTRACE_PROBE2(invalid__l3, mac_client_impl_t *, mcip, 1673 mblk_t *, mp); 1674 return; 1675 } 1676 1677 switch (mhi.mhi_bindsap) { 1678 case ETHERTYPE_IP: { 1679 struct dhcp *dh4; 1680 ipha_t *ipha = (ipha_t *)start; 1681 1682 if (start + sizeof (ipha_t) > end) 1683 return; 1684 1685 if (get_dhcpv4_info(ipha, end, &dh4) == 0) { 1686 intercept_dhcpv4_inbound(mcip, end, dh4); 1687 } 1688 break; 1689 } 1690 case ETHERTYPE_IPV6: { 1691 dhcpv6_message_t *dh6; 1692 nd_router_advert_t *ra; 1693 ip6_t *ip6h = (ip6_t *)start; 1694 1695 if (start + sizeof (ip6_t) > end) 1696 return; 1697 1698 if (get_dhcpv6_info(ip6h, end, &dh6) == 0) { 1699 intercept_dhcpv6_inbound(mcip, end, dh6); 1700 } else if (get_ra_info(ip6h, end, &ra) == 0) { 1701 intercept_ra_inbound(mcip, ip6h, end, ra); 1702 } 1703 1704 break; 1705 } 1706 } 1707 freemsg(nmp); 1708 } 1709 1710 void 1711 mac_protect_intercept_dynamic(mac_client_impl_t *mcip, mblk_t *mp) 1712 { 1713 /* 1714 * Skip checks if we are part of an aggr. 1715 */ 1716 if ((mcip->mci_state_flags & MCIS_IS_AGGR_PORT) != 0) 1717 return; 1718 1719 for (; mp != NULL; mp = mp->b_next) 1720 mac_protect_intercept_dynamic_one(mcip, mp); 1721 } 1722 1723 void 1724 mac_protect_flush_dynamic(mac_client_impl_t *mcip) 1725 { 1726 mutex_enter(&mcip->mci_protect_lock); 1727 flush_dhcpv4(mcip); 1728 flush_dhcpv6(mcip); 1729 flush_slaac(mcip); 1730 mutex_exit(&mcip->mci_protect_lock); 1731 } 1732 1733 void 1734 mac_protect_cancel_timer(mac_client_impl_t *mcip) 1735 { 1736 mutex_enter(&mcip->mci_protect_lock); 1737 cancel_txn_cleanup_timer(mcip); 1738 mutex_exit(&mcip->mci_protect_lock); 1739 } 1740 1741 /* 1742 * Check if addr is in the 'allowed-ips' list. 1743 */ 1744 1745 /* ARGSUSED */ 1746 static boolean_t 1747 ipnospoof_check_v4(mac_client_impl_t *mcip, mac_protect_t *protect, 1748 ipaddr_t *addr) 1749 { 1750 uint_t i; 1751 1752 /* 1753 * The unspecified address is allowed. 1754 */ 1755 if (*addr == INADDR_ANY) 1756 return (B_TRUE); 1757 1758 for (i = 0; i < protect->mp_ipaddrcnt; i++) { 1759 mac_ipaddr_t *v4addr = &protect->mp_ipaddrs[i]; 1760 1761 if (v4addr->ip_version == IPV4_VERSION) { 1762 uint32_t mask; 1763 1764 /* LINTED E_SUSPICIOUS_COMPARISON */ 1765 ASSERT(v4addr->ip_netmask >= 0 && 1766 v4addr->ip_netmask <= 32); 1767 mask = 0xFFFFFFFFu << (32 - v4addr->ip_netmask); 1768 /* 1769 * Since we have a netmask we know this entry 1770 * signifies the entire subnet. Check if the 1771 * given address is on the subnet. 1772 */ 1773 if (htonl(V4_PART_OF_V6(v4addr->ip_addr)) == 1774 (htonl(*addr) & mask)) 1775 return (B_TRUE); 1776 } 1777 } 1778 return (protect->mp_ipaddrcnt == 0 ? 1779 check_dhcpv4_dyn_ip(mcip, *addr) : B_FALSE); 1780 } 1781 1782 static boolean_t 1783 ipnospoof_check_v6(mac_client_impl_t *mcip, mac_protect_t *protect, 1784 in6_addr_t *addr) 1785 { 1786 uint_t i; 1787 1788 /* 1789 * The unspecified address and the v6 link local address are allowed. 1790 */ 1791 if (IN6_IS_ADDR_UNSPECIFIED(addr) || 1792 ((mcip->mci_protect_flags & MPT_FLAG_V6_LOCAL_ADDR_SET) != 0 && 1793 IN6_ARE_ADDR_EQUAL(&mcip->mci_v6_local_addr, addr))) 1794 return (B_TRUE); 1795 1796 1797 for (i = 0; i < protect->mp_ipaddrcnt; i++) { 1798 mac_ipaddr_t *v6addr = &protect->mp_ipaddrs[i]; 1799 1800 if (v6addr->ip_version == IPV6_VERSION && 1801 /* LINTED E_SUSPICIOUS_COMPARISON */ 1802 IN6_ARE_PREFIXEDADDR_EQUAL(&v6addr->ip_addr, addr, 1803 v6addr->ip_netmask)) 1804 return (B_TRUE); 1805 } 1806 1807 if (protect->mp_ipaddrcnt == 0) { 1808 return (check_slaac_ip(mcip, addr) || 1809 check_dhcpv6_dyn_ip(mcip, addr)); 1810 } else { 1811 return (B_FALSE); 1812 } 1813 } 1814 1815 /* 1816 * Checks various fields within an IPv6 NDP packet. 1817 */ 1818 static boolean_t 1819 ipnospoof_check_ndp(mac_client_impl_t *mcip, mac_protect_t *protect, 1820 ip6_t *ip6h, uchar_t *end) 1821 { 1822 icmp6_t *icmp_nd = (icmp6_t *)&ip6h[1]; 1823 int hdrlen, optlen, opttype, len; 1824 uint_t addrlen, maclen; 1825 uint8_t type; 1826 nd_opt_hdr_t *opt; 1827 struct nd_opt_lla *lla = NULL; 1828 1829 /* 1830 * NDP packets do not have extension headers so the ICMPv6 header 1831 * must immediately follow the IPv6 header. 1832 */ 1833 if (ip6h->ip6_nxt != IPPROTO_ICMPV6) 1834 return (B_TRUE); 1835 1836 /* ICMPv6 header missing */ 1837 if ((uchar_t *)&icmp_nd[1] > end) 1838 return (B_FALSE); 1839 1840 len = end - (uchar_t *)icmp_nd; 1841 type = icmp_nd->icmp6_type; 1842 1843 switch (type) { 1844 case ND_ROUTER_SOLICIT: 1845 hdrlen = sizeof (nd_router_solicit_t); 1846 break; 1847 case ND_ROUTER_ADVERT: 1848 hdrlen = sizeof (nd_router_advert_t); 1849 break; 1850 case ND_NEIGHBOR_SOLICIT: 1851 hdrlen = sizeof (nd_neighbor_solicit_t); 1852 break; 1853 case ND_NEIGHBOR_ADVERT: 1854 hdrlen = sizeof (nd_neighbor_advert_t); 1855 break; 1856 case ND_REDIRECT: 1857 hdrlen = sizeof (nd_redirect_t); 1858 break; 1859 default: 1860 return (B_TRUE); 1861 } 1862 1863 if (len < hdrlen) 1864 return (B_FALSE); 1865 1866 /* SLLA option checking is needed for RS/RA/NS */ 1867 opttype = ND_OPT_SOURCE_LINKADDR; 1868 1869 switch (type) { 1870 case ND_NEIGHBOR_ADVERT: { 1871 nd_neighbor_advert_t *na = (nd_neighbor_advert_t *)icmp_nd; 1872 1873 if (!ipnospoof_check_v6(mcip, protect, &na->nd_na_target)) { 1874 DTRACE_PROBE2(ndp__na__fail, 1875 mac_client_impl_t *, mcip, ip6_t *, ip6h); 1876 return (B_FALSE); 1877 } 1878 1879 /* TLLA option for NA */ 1880 opttype = ND_OPT_TARGET_LINKADDR; 1881 break; 1882 } 1883 case ND_REDIRECT: { 1884 /* option checking not needed for RD */ 1885 return (B_TRUE); 1886 } 1887 default: 1888 break; 1889 } 1890 1891 if (len == hdrlen) { 1892 /* no options, we're done */ 1893 return (B_TRUE); 1894 } 1895 opt = (nd_opt_hdr_t *)((uchar_t *)icmp_nd + hdrlen); 1896 optlen = len - hdrlen; 1897 1898 /* find the option header we need */ 1899 while (optlen > sizeof (nd_opt_hdr_t)) { 1900 if (opt->nd_opt_type == opttype) { 1901 lla = (struct nd_opt_lla *)opt; 1902 break; 1903 } 1904 optlen -= 8 * opt->nd_opt_len; 1905 opt = (nd_opt_hdr_t *) 1906 ((uchar_t *)opt + 8 * opt->nd_opt_len); 1907 } 1908 if (lla == NULL) 1909 return (B_TRUE); 1910 1911 addrlen = lla->nd_opt_lla_len * 8 - sizeof (nd_opt_hdr_t); 1912 maclen = mcip->mci_mip->mi_info.mi_addr_length; 1913 1914 if (addrlen != maclen || 1915 bcmp(mcip->mci_unicast->ma_addr, 1916 lla->nd_opt_lla_hdw_addr, maclen) != 0) { 1917 DTRACE_PROBE2(ndp__lla__fail, 1918 mac_client_impl_t *, mcip, ip6_t *, ip6h); 1919 return (B_FALSE); 1920 } 1921 1922 DTRACE_PROBE2(ndp__lla__ok, mac_client_impl_t *, mcip, ip6_t *, ip6h); 1923 return (B_TRUE); 1924 } 1925 1926 /* 1927 * Enforce ip-nospoof protection. 1928 */ 1929 static int 1930 ipnospoof_check(mac_client_impl_t *mcip, mac_protect_t *protect, 1931 mblk_t *mp, mac_header_info_t *mhip) 1932 { 1933 size_t hdrsize = mhip->mhi_hdrsize; 1934 uint32_t sap = mhip->mhi_bindsap; 1935 uchar_t *start, *end; 1936 mblk_t *nmp = NULL; 1937 int err; 1938 1939 err = get_l3_info(mp, hdrsize, &start, &end, &nmp); 1940 if (err != 0) { 1941 DTRACE_PROBE2(invalid__l3, mac_client_impl_t *, mcip, 1942 mblk_t *, mp); 1943 return (err); 1944 } 1945 err = EINVAL; 1946 1947 switch (sap) { 1948 case ETHERTYPE_IP: { 1949 ipha_t *ipha = (ipha_t *)start; 1950 1951 if (start + sizeof (ipha_t) > end) 1952 goto fail; 1953 1954 if (!ipnospoof_check_v4(mcip, protect, &ipha->ipha_src)) 1955 goto fail; 1956 1957 if (!intercept_dhcpv4_outbound(mcip, ipha, end)) 1958 goto fail; 1959 break; 1960 } 1961 case ETHERTYPE_ARP: { 1962 arh_t *arh = (arh_t *)start; 1963 uint32_t maclen, hlen, plen, arplen; 1964 ipaddr_t spaddr; 1965 uchar_t *shaddr; 1966 1967 if (start + sizeof (arh_t) > end) 1968 goto fail; 1969 1970 maclen = mcip->mci_mip->mi_info.mi_addr_length; 1971 hlen = arh->arh_hlen; 1972 plen = arh->arh_plen; 1973 if ((hlen != 0 && hlen != maclen) || 1974 plen != sizeof (ipaddr_t)) 1975 goto fail; 1976 1977 arplen = sizeof (arh_t) + 2 * hlen + 2 * plen; 1978 if (start + arplen > end) 1979 goto fail; 1980 1981 shaddr = start + sizeof (arh_t); 1982 if (hlen != 0 && 1983 bcmp(mcip->mci_unicast->ma_addr, shaddr, maclen) != 0) 1984 goto fail; 1985 1986 bcopy(shaddr + hlen, &spaddr, sizeof (spaddr)); 1987 if (!ipnospoof_check_v4(mcip, protect, &spaddr)) 1988 goto fail; 1989 break; 1990 } 1991 case ETHERTYPE_IPV6: { 1992 ip6_t *ip6h = (ip6_t *)start; 1993 1994 if (start + sizeof (ip6_t) > end) 1995 goto fail; 1996 1997 if (!ipnospoof_check_v6(mcip, protect, &ip6h->ip6_src)) 1998 goto fail; 1999 2000 if (!ipnospoof_check_ndp(mcip, protect, ip6h, end)) 2001 goto fail; 2002 2003 if (!intercept_dhcpv6_outbound(mcip, ip6h, end)) 2004 goto fail; 2005 break; 2006 } 2007 } 2008 freemsg(nmp); 2009 return (0); 2010 2011 fail: 2012 freemsg(nmp); 2013 return (err); 2014 } 2015 2016 static boolean_t 2017 dhcpnospoof_check_cid(mac_protect_t *p, uchar_t *cid, uint_t cidlen) 2018 { 2019 int i; 2020 2021 for (i = 0; i < p->mp_cidcnt; i++) { 2022 mac_dhcpcid_t *dcid = &p->mp_cids[i]; 2023 2024 if (dcid->dc_len == cidlen && 2025 bcmp(dcid->dc_id, cid, cidlen) == 0) 2026 return (B_TRUE); 2027 } 2028 return (B_FALSE); 2029 } 2030 2031 static boolean_t 2032 dhcpnospoof_check_v4(mac_client_impl_t *mcip, mac_protect_t *p, 2033 ipha_t *ipha, uchar_t *end) 2034 { 2035 struct dhcp *dh4; 2036 uchar_t *cid; 2037 uint_t maclen, cidlen = 0; 2038 uint8_t optlen; 2039 int err; 2040 2041 if ((err = get_dhcpv4_info(ipha, end, &dh4)) != 0) 2042 return (err == EINVAL); 2043 2044 maclen = mcip->mci_mip->mi_info.mi_addr_length; 2045 if (dh4->hlen == maclen && 2046 bcmp(mcip->mci_unicast->ma_addr, dh4->chaddr, maclen) != 0) { 2047 return (B_FALSE); 2048 } 2049 if (get_dhcpv4_option(dh4, end, CD_CLIENT_ID, &cid, &optlen) == 0) 2050 cidlen = optlen; 2051 2052 if (cidlen == 0) 2053 return (B_TRUE); 2054 2055 if (*cid == ARPHRD_ETHER && cidlen - 1 == maclen && 2056 bcmp(mcip->mci_unicast->ma_addr, cid + 1, maclen) == 0) 2057 return (B_TRUE); 2058 2059 return (dhcpnospoof_check_cid(p, cid, cidlen)); 2060 } 2061 2062 static boolean_t 2063 dhcpnospoof_check_v6(mac_client_impl_t *mcip, mac_protect_t *p, 2064 ip6_t *ip6h, uchar_t *end) 2065 { 2066 dhcpv6_message_t *dh6; 2067 dhcpv6_option_t *d6o; 2068 uint8_t mtype; 2069 uchar_t *cid, *lladdr = NULL; 2070 uint_t cidlen, maclen, addrlen = 0; 2071 uint16_t cidtype; 2072 int err; 2073 2074 if ((err = get_dhcpv6_info(ip6h, end, &dh6)) != 0) 2075 return (err == EINVAL); 2076 2077 /* 2078 * We only check client-generated messages. 2079 */ 2080 mtype = dh6->d6m_msg_type; 2081 if (mtype == DHCPV6_MSG_ADVERTISE || mtype == DHCPV6_MSG_REPLY || 2082 mtype == DHCPV6_MSG_RECONFIGURE) 2083 return (B_TRUE); 2084 2085 d6o = get_dhcpv6_option(&dh6[1], end - (uchar_t *)&dh6[1], NULL, 2086 DHCPV6_OPT_CLIENTID, &cidlen); 2087 if (d6o == NULL || (uchar_t *)d6o + cidlen > end) 2088 return (B_TRUE); 2089 2090 cid = (uchar_t *)&d6o[1]; 2091 cidlen -= sizeof (*d6o); 2092 if (cidlen < sizeof (cidtype)) 2093 return (B_TRUE); 2094 2095 bcopy(cid, &cidtype, sizeof (cidtype)); 2096 cidtype = ntohs(cidtype); 2097 if (cidtype == DHCPV6_DUID_LLT && cidlen >= sizeof (duid_llt_t)) { 2098 lladdr = cid + sizeof (duid_llt_t); 2099 addrlen = cidlen - sizeof (duid_llt_t); 2100 } 2101 if (cidtype == DHCPV6_DUID_LL && cidlen >= sizeof (duid_ll_t)) { 2102 lladdr = cid + sizeof (duid_ll_t); 2103 addrlen = cidlen - sizeof (duid_ll_t); 2104 } 2105 maclen = mcip->mci_mip->mi_info.mi_addr_length; 2106 if (lladdr != NULL && addrlen == maclen && 2107 bcmp(mcip->mci_unicast->ma_addr, lladdr, maclen) == 0) { 2108 return (B_TRUE); 2109 } 2110 return (dhcpnospoof_check_cid(p, cid, cidlen)); 2111 } 2112 2113 /* 2114 * Enforce dhcp-nospoof protection. 2115 */ 2116 static int 2117 dhcpnospoof_check(mac_client_impl_t *mcip, mac_protect_t *protect, 2118 mblk_t *mp, mac_header_info_t *mhip) 2119 { 2120 size_t hdrsize = mhip->mhi_hdrsize; 2121 uint32_t sap = mhip->mhi_bindsap; 2122 uchar_t *start, *end; 2123 mblk_t *nmp = NULL; 2124 int err; 2125 2126 err = get_l3_info(mp, hdrsize, &start, &end, &nmp); 2127 if (err != 0) { 2128 DTRACE_PROBE2(invalid__l3, mac_client_impl_t *, mcip, 2129 mblk_t *, mp); 2130 return (err); 2131 } 2132 err = EINVAL; 2133 2134 switch (sap) { 2135 case ETHERTYPE_IP: { 2136 ipha_t *ipha = (ipha_t *)start; 2137 2138 if (start + sizeof (ipha_t) > end) 2139 goto fail; 2140 2141 if (!dhcpnospoof_check_v4(mcip, protect, ipha, end)) 2142 goto fail; 2143 2144 break; 2145 } 2146 case ETHERTYPE_IPV6: { 2147 ip6_t *ip6h = (ip6_t *)start; 2148 2149 if (start + sizeof (ip6_t) > end) 2150 goto fail; 2151 2152 if (!dhcpnospoof_check_v6(mcip, protect, ip6h, end)) 2153 goto fail; 2154 2155 break; 2156 } 2157 } 2158 freemsg(nmp); 2159 return (0); 2160 2161 fail: 2162 /* increment dhcpnospoof stat here */ 2163 freemsg(nmp); 2164 return (err); 2165 } 2166 2167 /* 2168 * This is called whenever the mac client's mac address changes, to make sure 2169 * we allow use of the new link-local address. 2170 */ 2171 static void 2172 mac_protect_update_v6_local_addr(mac_client_impl_t *mcip) 2173 { 2174 uint_t i; 2175 in6_addr_t *token = &mcip->mci_v6_mac_token; 2176 in6_addr_t *v6addr = &mcip->mci_v6_local_addr; 2177 in6_addr_t ll_template = {(uint32_t)V6_LINKLOCAL, 0x0, 0x0, 0x0}; 2178 2179 for (i = 0; i < 4; i++) { 2180 v6addr->s6_addr32[i] = token->s6_addr32[i] | 2181 ll_template.s6_addr32[i]; 2182 } 2183 mcip->mci_protect_flags |= MPT_FLAG_V6_LOCAL_ADDR_SET; 2184 } 2185 2186 /* 2187 * This is called whenever the mac client's mac address changes, to make sure 2188 * that any existing addresses gained via SLAAC are appropriately updated. 2189 */ 2190 static void 2191 mac_protect_update_v6_slaac_addr(mac_client_impl_t *mcip) 2192 { 2193 void *cookie = NULL; 2194 avl_tree_t temp_tree; 2195 avl_tree_t *ttp = &temp_tree, *sip = &mcip->mci_v6_slaac_ip; 2196 in6_addr_t *token = &mcip->mci_v6_mac_token; 2197 slaac_addr_t *addr = NULL; 2198 2199 avl_create(ttp, compare_slaac_ip, sizeof (slaac_addr_t), 2200 offsetof(slaac_addr_t, sla_node)); 2201 2202 /* Copy everything over to the temporary tree, and fix the IP address */ 2203 while ((addr = avl_destroy_nodes(sip, &cookie)) != NULL) { 2204 VERIFY(insert_slaac_ip(ttp, token, addr) == B_TRUE); 2205 } 2206 2207 /* 2208 * Now that the tempory tree has all of the modified addresses, we can 2209 * swap them over to the original tree once it's reset. 2210 */ 2211 avl_destroy(sip); 2212 avl_create(sip, compare_slaac_ip, sizeof (slaac_addr_t), 2213 offsetof(slaac_addr_t, sla_node)); 2214 avl_swap(ttp, sip); 2215 } 2216 2217 /* 2218 * After the unicast MAC address changes, we need to update the derived token, 2219 * and update the IPv6 addresses that use the token. 2220 */ 2221 void 2222 mac_protect_update_mac_token(mac_client_impl_t *mcip) 2223 { 2224 uint_t media = mcip->mci_mip->mi_info.mi_media; 2225 uint8_t *p, *macaddr = mcip->mci_unicast->ma_addr; 2226 in6_addr_t *token = &mcip->mci_v6_mac_token; 2227 2228 bzero(token, sizeof (in6_addr_t)); 2229 p = (uint8_t *)&token->s6_addr32[2]; 2230 2231 switch (media) { 2232 case DL_ETHER: 2233 bcopy(macaddr, p, 3); 2234 p[0] ^= 0x2; 2235 p[3] = 0xff; 2236 p[4] = 0xfe; 2237 bcopy(macaddr + 3, p + 5, 3); 2238 break; 2239 case DL_IB: 2240 ASSERT(mcip->mci_mip->mi_info.mi_addr_length == 20); 2241 bcopy(macaddr + 12, p, 8); 2242 p[0] |= 2; 2243 break; 2244 default: 2245 /* 2246 * We do not need to generate the local address for link types 2247 * that do not support link protection. Wifi pretends to be 2248 * Ethernet so it is covered by the DL_ETHER case (note the 2249 * use of mi_media instead of mi_nativemedia). 2250 */ 2251 return; 2252 } 2253 2254 mac_protect_update_v6_local_addr(mcip); 2255 mac_protect_update_v6_slaac_addr(mcip); 2256 } 2257 2258 2259 2260 /* 2261 * Enforce link protection on one packet. 2262 */ 2263 static int 2264 mac_protect_check_one(mac_client_impl_t *mcip, mblk_t *mp) 2265 { 2266 mac_impl_t *mip = mcip->mci_mip; 2267 mac_resource_props_t *mrp = MCIP_RESOURCE_PROPS(mcip); 2268 mac_protect_t *protect; 2269 mac_header_info_t mhi; 2270 uint32_t types; 2271 int err; 2272 2273 ASSERT(mp->b_next == NULL); 2274 ASSERT(mrp != NULL); 2275 2276 err = mac_vlan_header_info((mac_handle_t)mip, mp, &mhi); 2277 if (err != 0) { 2278 DTRACE_PROBE2(invalid__header, mac_client_impl_t *, mcip, 2279 mblk_t *, mp); 2280 return (err); 2281 } 2282 protect = &mrp->mrp_protect; 2283 types = protect->mp_types; 2284 2285 if ((types & MPT_MACNOSPOOF) != 0) { 2286 if (mhi.mhi_saddr != NULL && 2287 bcmp(mcip->mci_unicast->ma_addr, mhi.mhi_saddr, 2288 mip->mi_info.mi_addr_length) != 0) { 2289 BUMP_STAT(mcip, macspoofed); 2290 DTRACE_PROBE2(mac__nospoof__fail, 2291 mac_client_impl_t *, mcip, mblk_t *, mp); 2292 return (EINVAL); 2293 } 2294 } 2295 if ((types & MPT_RESTRICTED) != 0) { 2296 uint32_t vid = VLAN_ID(mhi.mhi_tci); 2297 uint32_t sap = mhi.mhi_bindsap; 2298 2299 /* 2300 * ETHERTYPE_VLAN packets are allowed through, provided that 2301 * the vid is not spoofed. 2302 */ 2303 if (vid != 0 && !mac_client_check_flow_vid(mcip, vid)) { 2304 BUMP_STAT(mcip, restricted); 2305 DTRACE_PROBE2(restricted__vid__invalid, 2306 mac_client_impl_t *, mcip, mblk_t *, mp); 2307 return (EINVAL); 2308 } 2309 2310 if (sap != ETHERTYPE_IP && sap != ETHERTYPE_IPV6 && 2311 sap != ETHERTYPE_ARP) { 2312 BUMP_STAT(mcip, restricted); 2313 DTRACE_PROBE2(restricted__fail, 2314 mac_client_impl_t *, mcip, mblk_t *, mp); 2315 return (EINVAL); 2316 } 2317 } 2318 if ((types & MPT_IPNOSPOOF) != 0) { 2319 if ((err = ipnospoof_check(mcip, protect, mp, &mhi)) != 0) { 2320 BUMP_STAT(mcip, ipspoofed); 2321 DTRACE_PROBE2(ip__nospoof__fail, 2322 mac_client_impl_t *, mcip, mblk_t *, mp); 2323 return (err); 2324 } 2325 } 2326 if ((types & MPT_DHCPNOSPOOF) != 0) { 2327 if ((err = dhcpnospoof_check(mcip, protect, mp, &mhi)) != 0) { 2328 BUMP_STAT(mcip, dhcpspoofed); 2329 DTRACE_PROBE2(dhcp__nospoof__fail, 2330 mac_client_impl_t *, mcip, mblk_t *, mp); 2331 return (err); 2332 } 2333 } 2334 return (0); 2335 } 2336 2337 /* 2338 * Enforce link protection on a packet chain. 2339 * Packets that pass the checks are returned back to the caller. 2340 */ 2341 mblk_t * 2342 mac_protect_check(mac_client_handle_t mch, mblk_t *mp) 2343 { 2344 mac_client_impl_t *mcip = (mac_client_impl_t *)mch; 2345 mblk_t *ret_mp = NULL, **tailp = &ret_mp, *next; 2346 2347 /* 2348 * Skip checks if we are part of an aggr. 2349 */ 2350 if ((mcip->mci_state_flags & MCIS_IS_AGGR_PORT) != 0) 2351 return (mp); 2352 2353 for (; mp != NULL; mp = next) { 2354 next = mp->b_next; 2355 mp->b_next = NULL; 2356 2357 if (mac_protect_check_one(mcip, mp) == 0) { 2358 *tailp = mp; 2359 tailp = &mp->b_next; 2360 } else { 2361 freemsg(mp); 2362 } 2363 } 2364 return (ret_mp); 2365 } 2366 2367 /* 2368 * Check if a particular protection type is enabled. 2369 */ 2370 boolean_t 2371 mac_protect_enabled(mac_client_handle_t mch, uint32_t type) 2372 { 2373 return (MAC_PROTECT_ENABLED((mac_client_impl_t *)mch, type)); 2374 } 2375 2376 static int 2377 validate_ips(mac_protect_t *p) 2378 { 2379 uint_t i, j; 2380 2381 if (p->mp_ipaddrcnt == MPT_RESET) 2382 return (0); 2383 2384 if (p->mp_ipaddrcnt > MPT_MAXIPADDR) 2385 return (EINVAL); 2386 2387 for (i = 0; i < p->mp_ipaddrcnt; i++) { 2388 mac_ipaddr_t *addr = &p->mp_ipaddrs[i]; 2389 2390 /* 2391 * The unspecified address is implicitly allowed so there's no 2392 * need to add it to the list. Also, validate that the netmask, 2393 * if any, is sane for the specific version of IP. A mask of 2394 * some kind is always required. 2395 */ 2396 if (addr->ip_netmask == 0) 2397 return (EINVAL); 2398 2399 if (addr->ip_version == IPV4_VERSION) { 2400 if (V4_PART_OF_V6(addr->ip_addr) == INADDR_ANY) 2401 return (EINVAL); 2402 if (addr->ip_netmask > 32) 2403 return (EINVAL); 2404 } else if (addr->ip_version == IPV6_VERSION) { 2405 if (IN6_IS_ADDR_UNSPECIFIED(&addr->ip_addr)) 2406 return (EINVAL); 2407 2408 if (IN6_IS_ADDR_V4MAPPED_ANY(&addr->ip_addr)) 2409 return (EINVAL); 2410 2411 if (addr->ip_netmask > 128) 2412 return (EINVAL); 2413 } else { 2414 /* invalid ip version */ 2415 return (EINVAL); 2416 } 2417 2418 for (j = 0; j < p->mp_ipaddrcnt; j++) { 2419 mac_ipaddr_t *addr1 = &p->mp_ipaddrs[j]; 2420 2421 if (i == j || addr->ip_version != addr1->ip_version) 2422 continue; 2423 2424 /* found a duplicate */ 2425 if ((addr->ip_version == IPV4_VERSION && 2426 V4_PART_OF_V6(addr->ip_addr) == 2427 V4_PART_OF_V6(addr1->ip_addr)) || 2428 IN6_ARE_ADDR_EQUAL(&addr->ip_addr, 2429 &addr1->ip_addr)) 2430 return (EINVAL); 2431 } 2432 } 2433 return (0); 2434 } 2435 2436 /* ARGSUSED */ 2437 static int 2438 validate_cids(mac_protect_t *p) 2439 { 2440 uint_t i, j; 2441 2442 if (p->mp_cidcnt == MPT_RESET) 2443 return (0); 2444 2445 if (p->mp_cidcnt > MPT_MAXCID) 2446 return (EINVAL); 2447 2448 for (i = 0; i < p->mp_cidcnt; i++) { 2449 mac_dhcpcid_t *cid = &p->mp_cids[i]; 2450 2451 if (cid->dc_len > MPT_MAXCIDLEN || 2452 (cid->dc_form != CIDFORM_TYPED && 2453 cid->dc_form != CIDFORM_HEX && 2454 cid->dc_form != CIDFORM_STR)) 2455 return (EINVAL); 2456 2457 for (j = 0; j < p->mp_cidcnt; j++) { 2458 mac_dhcpcid_t *cid1 = &p->mp_cids[j]; 2459 2460 if (i == j || cid->dc_len != cid1->dc_len) 2461 continue; 2462 2463 /* found a duplicate */ 2464 if (bcmp(cid->dc_id, cid1->dc_id, cid->dc_len) == 0) 2465 return (EINVAL); 2466 } 2467 } 2468 return (0); 2469 } 2470 2471 /* 2472 * Sanity-checks parameters given by userland. 2473 */ 2474 int 2475 mac_protect_validate(mac_resource_props_t *mrp) 2476 { 2477 mac_protect_t *p = &mrp->mrp_protect; 2478 int err; 2479 2480 /* check for invalid types */ 2481 if (p->mp_types != MPT_RESET && (p->mp_types & ~MPT_ALL) != 0) 2482 return (EINVAL); 2483 2484 if ((err = validate_ips(p)) != 0) 2485 return (err); 2486 2487 if ((err = validate_cids(p)) != 0) 2488 return (err); 2489 2490 return (0); 2491 } 2492 2493 /* 2494 * Enable/disable link protection. 2495 */ 2496 int 2497 mac_protect_set(mac_client_handle_t mch, mac_resource_props_t *mrp) 2498 { 2499 mac_client_impl_t *mcip = (mac_client_impl_t *)mch; 2500 mac_impl_t *mip = mcip->mci_mip; 2501 uint_t media = mip->mi_info.mi_nativemedia; 2502 int err; 2503 2504 ASSERT(MAC_PERIM_HELD((mac_handle_t)mip)); 2505 2506 /* tunnels are not supported */ 2507 if (media == DL_IPV4 || media == DL_IPV6 || media == DL_6TO4) 2508 return (ENOTSUP); 2509 2510 if ((err = mac_protect_validate(mrp)) != 0) 2511 return (err); 2512 2513 if (err != 0) 2514 return (err); 2515 2516 mac_update_resources(mrp, MCIP_RESOURCE_PROPS(mcip), B_FALSE); 2517 i_mac_notify(((mcip->mci_state_flags & MCIS_IS_VNIC) != 0 ? 2518 mcip->mci_upper_mip : mip), MAC_NOTE_ALLOWED_IPS); 2519 return (0); 2520 } 2521 2522 void 2523 mac_protect_update(mac_resource_props_t *new, mac_resource_props_t *curr) 2524 { 2525 mac_protect_t *np = &new->mrp_protect; 2526 mac_protect_t *cp = &curr->mrp_protect; 2527 uint32_t types = np->mp_types; 2528 2529 if (types == MPT_RESET) { 2530 cp->mp_types = 0; 2531 curr->mrp_mask &= ~MRP_PROTECT; 2532 } else { 2533 if (types != 0) { 2534 cp->mp_types = types; 2535 curr->mrp_mask |= MRP_PROTECT; 2536 } 2537 } 2538 if (np->mp_ipaddrcnt != 0) { 2539 if (np->mp_ipaddrcnt <= MPT_MAXIPADDR) { 2540 bcopy(np->mp_ipaddrs, cp->mp_ipaddrs, 2541 sizeof (cp->mp_ipaddrs)); 2542 cp->mp_ipaddrcnt = np->mp_ipaddrcnt; 2543 } else if (np->mp_ipaddrcnt == MPT_RESET) { 2544 bzero(cp->mp_ipaddrs, sizeof (cp->mp_ipaddrs)); 2545 cp->mp_ipaddrcnt = 0; 2546 } 2547 } 2548 if (np->mp_cidcnt != 0) { 2549 if (np->mp_cidcnt <= MPT_MAXCID) { 2550 bcopy(np->mp_cids, cp->mp_cids, sizeof (cp->mp_cids)); 2551 cp->mp_cidcnt = np->mp_cidcnt; 2552 } else if (np->mp_cidcnt == MPT_RESET) { 2553 bzero(cp->mp_cids, sizeof (cp->mp_cids)); 2554 cp->mp_cidcnt = 0; 2555 } 2556 } 2557 } 2558 2559 void 2560 mac_protect_init(mac_client_impl_t *mcip) 2561 { 2562 mutex_init(&mcip->mci_protect_lock, NULL, MUTEX_DRIVER, NULL); 2563 mcip->mci_protect_flags = 0; 2564 mcip->mci_txn_cleanup_tid = 0; 2565 avl_create(&mcip->mci_v4_pending_txn, compare_dhcpv4_xid, 2566 sizeof (dhcpv4_txn_t), offsetof(dhcpv4_txn_t, dt_node)); 2567 avl_create(&mcip->mci_v4_completed_txn, compare_dhcpv4_cid, 2568 sizeof (dhcpv4_txn_t), offsetof(dhcpv4_txn_t, dt_node)); 2569 avl_create(&mcip->mci_v4_dyn_ip, compare_dhcpv4_ip, 2570 sizeof (dhcpv4_txn_t), offsetof(dhcpv4_txn_t, dt_ipnode)); 2571 avl_create(&mcip->mci_v6_pending_txn, compare_dhcpv6_xid, 2572 sizeof (dhcpv6_txn_t), offsetof(dhcpv6_txn_t, dt_node)); 2573 avl_create(&mcip->mci_v6_cid, compare_dhcpv6_cid, 2574 sizeof (dhcpv6_cid_t), offsetof(dhcpv6_cid_t, dc_node)); 2575 avl_create(&mcip->mci_v6_dyn_ip, compare_dhcpv6_ip, 2576 sizeof (dhcpv6_addr_t), offsetof(dhcpv6_addr_t, da_node)); 2577 avl_create(&mcip->mci_v6_slaac_ip, compare_slaac_ip, 2578 sizeof (slaac_addr_t), offsetof(slaac_addr_t, sla_node)); 2579 2580 if (mcip->mci_state_flags & MCIS_IS_VNIC) 2581 mcip->mci_protect_flags |= MPT_FLAG_PROMISC_FILTERED; 2582 } 2583 2584 void 2585 mac_protect_fini(mac_client_impl_t *mcip) 2586 { 2587 avl_destroy(&mcip->mci_v6_dyn_ip); 2588 avl_destroy(&mcip->mci_v6_cid); 2589 avl_destroy(&mcip->mci_v6_pending_txn); 2590 avl_destroy(&mcip->mci_v4_dyn_ip); 2591 avl_destroy(&mcip->mci_v4_completed_txn); 2592 avl_destroy(&mcip->mci_v4_pending_txn); 2593 avl_destroy(&mcip->mci_v6_slaac_ip); 2594 mcip->mci_txn_cleanup_tid = 0; 2595 mcip->mci_protect_flags = 0; 2596 mutex_destroy(&mcip->mci_protect_lock); 2597 } 2598 2599 static boolean_t 2600 allowed_ips_set(mac_resource_props_t *mrp, uint32_t af) 2601 { 2602 int i; 2603 2604 for (i = 0; i < mrp->mrp_protect.mp_ipaddrcnt; i++) { 2605 if (mrp->mrp_protect.mp_ipaddrs[i].ip_version == af) 2606 return (B_TRUE); 2607 } 2608 return (B_FALSE); 2609 } 2610 2611 mac_protect_t * 2612 mac_protect_get(mac_handle_t mh) 2613 { 2614 mac_impl_t *mip = (mac_impl_t *)mh; 2615 2616 return (&mip->mi_resource_props.mrp_protect); 2617 } 2618