#include <sys/types.h>
#include <sys/stream.h>
#include <sys/strsun.h>
#include <sys/sunddi.h>
#include <sys/kstat.h>
#include <sys/kmem.h>
#include <sys/sdt.h>
#include <net/pfkeyv2.h>
#include <inet/common.h>
#include <inet/ip.h>
#include <inet/ip6.h>
#include <inet/ipsec_impl.h>
#include <inet/ipdrop.h>
void
ip_drop_init(ipsec_stack_t *ipss)
{
ipss->ipsec_ip_drop_kstat = kstat_create_netstack("ip", 0, "ipdrop",
"net", KSTAT_TYPE_NAMED,
sizeof (struct ip_dropstats) / sizeof (kstat_named_t),
KSTAT_FLAG_PERSISTENT, ipss->ipsec_netstack->netstack_stackid);
if (ipss->ipsec_ip_drop_kstat == NULL ||
ipss->ipsec_ip_drop_kstat->ks_data == NULL)
return;
ipss->ipsec_ip_drop_types = ipss->ipsec_ip_drop_kstat->ks_data;
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_tcp_clear,
"tcp_clear", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_tcp_secure,
"tcp_secure", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_tcp_mismatch,
"tcp_mismatch", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_tcp_ipsec_alloc,
"tcp_ipsec_alloc", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_sadb_inlarval_timeout,
"sadb_inlarval_timeout", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_sadb_inlarval_replace,
"sadb_inlarval_replace", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_sadb_inidle_overflow,
"sadb_inidle_overflow", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_sadb_inidle_timeout,
"sadb_inidle_timeout", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_sadb_acquire_nomem,
"sadb_acquire_nomem", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_sadb_acquire_toofull,
"sadb_acquire_toofull", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_sadb_acquire_timeout,
"sadb_acquire_timeout", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_ahesp_diffid,
"spd_ahesp_diffid", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_loopback_mismatch,
"spd_loopback_mismatch", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_explicit,
"spd_explicit", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_got_secure,
"spd_got_secure", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_got_clear,
"spd_got_clear", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_bad_ahalg,
"spd_bad_ahalg", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_got_ah,
"spd_got_ah", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_bad_espealg,
"spd_bad_espealg", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_bad_espaalg,
"spd_bad_espaalg", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_got_esp,
"spd_got_esp", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_got_selfencap,
"spd_got_selfencap", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_bad_selfencap,
"spd_bad_selfencap", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_nomem,
"spd_nomem", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_ah_badid,
"spd_ah_badid", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_ah_innermismatch,
"spd_ah_innermismatch", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_esp_innermismatch,
"spd_esp_innermismatch", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_esp_badid,
"spd_esp_badid", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_no_policy,
"spd_no_policy", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_malformed_packet,
"spd_malformed_packet", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_malformed_frag,
"spd_malformed_frag", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_overlap_frag,
"spd_overlap_frag", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_evil_frag,
"spd_evil_frag", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_max_frags,
"spd_max_frags", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_spd_expired_frags,
"spd_expired_frags", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_esp_nomem,
"esp_nomem", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_esp_no_sa,
"esp_no_sa", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_esp_early_replay,
"esp_early_replay", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_esp_replay,
"esp_replay", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_esp_bytes_expire,
"esp_bytes_expire", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_esp_bad_padlen,
"esp_bad_padlen", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_esp_bad_padding,
"esp_bad_padding", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_esp_bad_auth,
"esp_bad_auth", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_esp_crypto_failed,
"esp_crypto_failed", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_esp_icmp,
"esp_icmp", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_esp_nat_t_ipsec,
"esp_nat_t_ipsec", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_esp_nat_t_ka,
"esp_nat_t_ka", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_esp_iv_wrap,
"esp_iv_wrap", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_ah_nomem,
"ah_nomem", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_ah_bad_v6_hdrs,
"ah_bad_v6_hdrs", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_ah_bad_v4_opts,
"ah_bad_v4_opts", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_ah_no_sa,
"ah_no_sa", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_ah_bad_length,
"ah_bad_length", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_ah_bad_auth,
"ah_bad_auth", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_ah_crypto_failed,
"ah_crypto_failed", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_ah_early_replay,
"ah_early_replay", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_ah_replay,
"ah_replay", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_ah_bytes_expire,
"ah_bytes_expire", KSTAT_DATA_UINT64);
kstat_named_init(&ipss->ipsec_ip_drop_types->ipds_ip_ipsec_not_loaded,
"ip_ipsec_not_loaded", KSTAT_DATA_UINT64);
kstat_install(ipss->ipsec_ip_drop_kstat);
}
void
ip_drop_destroy(ipsec_stack_t *ipss)
{
kstat_delete_netstack(ipss->ipsec_ip_drop_kstat,
ipss->ipsec_netstack->netstack_stackid);
ipss->ipsec_ip_drop_kstat = NULL;
ipss->ipsec_ip_drop_types = NULL;
}
void
ip_drop_register(ipdropper_t *ipd, char *name)
{
if (ipd->ipd_name != NULL) {
cmn_err(CE_WARN,
"ip_drop_register: ipdropper %s already registered with %s",
name, ipd->ipd_name);
return;
}
ipd->ipd_name = kmem_alloc(strlen(name) + 1, KM_SLEEP);
(void) strcpy(ipd->ipd_name, name);
}
void
ip_drop_unregister(ipdropper_t *ipd)
{
if (ipd->ipd_name == NULL) {
cmn_err(CE_WARN,
"ip_drop_unregister: not registered (%p)\n",
(void *)ipd);
return;
}
kmem_free(ipd->ipd_name, strlen(ipd->ipd_name) + 1);
ipd->ipd_name = NULL;
}
void
ip_drop_packet(mblk_t *mp, boolean_t inbound, ill_t *ill,
struct kstat_named *counter, ipdropper_t *who_called)
{
char *str;
if (mp == NULL) {
return;
}
ASSERT(mp->b_datap->db_type == M_DATA);
if (counter != NULL) {
switch (counter->data_type) {
case KSTAT_DATA_INT32:
counter->value.i32++;
break;
case KSTAT_DATA_UINT32:
counter->value.ui32++;
break;
case KSTAT_DATA_INT64:
counter->value.i64++;
break;
case KSTAT_DATA_UINT64:
counter->value.ui64++;
break;
}
}
if (counter != NULL)
str = counter->name;
else if (who_called != NULL)
str = who_called->ipd_name;
else
str = "Unspecified IPsec drop";
if (inbound)
ip_drop_input(str, mp, ill);
else
ip_drop_output(str, mp, ill);
ASSERT(mp->b_prev == NULL && mp->b_next == NULL);
freemsg(mp);
}
void
ip_drop_input(char *str, mblk_t *mp, ill_t *ill)
{
if (mp == NULL)
return;
if (IPH_HDR_VERSION(mp->b_rptr) == IPV4_VERSION) {
ipha_t *ipha = (ipha_t *)mp->b_rptr;
DTRACE_IP7(drop__in, mblk_t *, mp, conn_t *, NULL, void_ip_t *,
ipha, __dtrace_ipsr_ill_t *, ill, ipha_t *, ipha,
ip6_t *, NULL, int, 0);
} else {
ip6_t *ip6h = (ip6_t *)mp->b_rptr;
DTRACE_IP7(drop__in, mblk_t *, mp, conn_t *, NULL, void_ip_t *,
ip6h, __dtrace_ipsr_ill_t *, ill, ipha_t *, NULL,
ip6_t *, ip6h, int, 0);
}
}
void
ip_drop_output(char *str, mblk_t *mp, ill_t *ill)
{
if (mp == NULL)
return;
if (IPH_HDR_VERSION(mp->b_rptr) == IPV4_VERSION) {
ipha_t *ipha = (ipha_t *)mp->b_rptr;
DTRACE_IP7(drop__out, mblk_t *, mp, conn_t *, NULL, void_ip_t *,
ipha, __dtrace_ipsr_ill_t *, ill, ipha_t *, ipha,
ip6_t *, NULL, int, 0);
} else {
ip6_t *ip6h = (ip6_t *)mp->b_rptr;
DTRACE_IP7(drop__out, mblk_t *, mp, conn_t *, NULL, void_ip_t *,
ip6h, __dtrace_ipsr_ill_t *, ill, ipha_t *, NULL,
ip6_t *, ip6h, int, 0);
}
}