xref: /illumos-gate/usr/src/uts/common/inet/ipclassifier.h (revision 1a220b56b93ff1dc80855691548503117af4cc10)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #ifndef	_INET_IPCLASSIFIER_H
27 #define	_INET_IPCLASSIFIER_H
28 
29 #pragma ident	"%Z%%M%	%I%	%E% SMI"
30 
31 #ifdef	__cplusplus
32 extern "C" {
33 #endif
34 
35 #include <inet/common.h>
36 #include <inet/ip.h>
37 #include <inet/mi.h>
38 #include <inet/tcp.h>
39 #include <inet/ip6.h>
40 #include <netinet/in.h>		/* for IPPROTO_* constants */
41 #include <sys/sdt.h>
42 
43 typedef void (*edesc_spf)(void *, mblk_t *, void *, int);
44 typedef void (*edesc_rpf)(void *, mblk_t *, void *);
45 
46 /*
47  * ==============================
48  * =	The CONNECTION		=
49  * ==============================
50  */
51 
52 /*
53  * The connection structure contains the common information/flags/ref needed.
54  * Implementation will keep the connection struct, the layers (with their
55  * respective data for event i.e. tcp_t if event was tcp_input) all in one
56  * contiguous memory location.
57  */
58 
59 /* Conn Flags */
60 #define	IPCL_UDPMOD		0x00020000	/* Is UDP module instance */
61 #define	IPCL_TCPMOD		0x00040000	/* Is TCP module instance */
62 #define	IPCL_FULLY_BOUND	0x00080000	/* Bound to correct squeue */
63 #define	IPCL_CHECK_POLICY	0x00100000	/* Needs policy checking */
64 #define	IPCL_SOCKET		0x00200000	/* Sockfs connection */
65 #define	IPCL_ACCEPTOR		0x00400000	/* Sockfs priv acceptor */
66 #define	IPCL_CL_LISTENER	0x00800000	/* Cluster listener */
67 #define	IPCL_EAGER		0x01000000	/* Incoming connection */
68 #define	IPCL_UDP		0x02000000	/* A UDP connection */
69 #define	IPCL_TCP6		0x04000000	/* A TCP6 connection */
70 #define	IPCL_TCP4		0x08000000	/* A TCP connection */
71 #define	IPCL_CONNECTED		0x40000000	/* Conn in connected table */
72 #define	IPCL_BOUND		0x80000000	/* Conn in bind table */
73 
74 /* Flags identifying the type of conn */
75 #define	IPCL_TCPCONN		0x00000001	/* Flag to indicate cache */
76 #define	IPCL_SCTPCONN		0x00000002
77 #define	IPCL_IPCCONN		0x00000004
78 #define	IPCL_ISV6		0x00000008	/* Is a V6 connection */
79 
80 /* Conn Masks */
81 #define	IPCL_TCP		(IPCL_TCP4|IPCL_TCP6)
82 #define	IPCL_REMOVED		0x00000020
83 #define	IPCL_REUSED		0x00000040
84 
85 #define	IPCL_IS_TCP4(connp)						\
86 	(((connp)->conn_flags & IPCL_TCP4))
87 
88 #define	IPCL_IS_TCP4_CONNECTED_NO_POLICY(connp)				\
89 	(((connp)->conn_flags &						\
90 		(IPCL_TCP4|IPCL_CONNECTED|IPCL_CHECK_POLICY|IPCL_TCP6))	\
91 		== (IPCL_TCP4|IPCL_CONNECTED))
92 
93 #define	IPCL_IS_CONNECTED(connp)					\
94 	((connp)->conn_flags & IPCL_CONNECTED)
95 
96 #define	IPCL_IS_BOUND(connp)						\
97 	((connp)->conn_flags & IPCL_BOUND)
98 
99 #define	IPCL_IS_TCP4_BOUND(connp)					\
100 	(((connp)->conn_flags &						\
101 		(IPCL_TCP4|IPCL_BOUND|IPCL_TCP6)) ==			\
102 		(IPCL_TCP4|IPCL_BOUND))
103 
104 #define	IPCL_IS_FULLY_BOUND(connp)					\
105 	((connp)->conn_flags & IPCL_FULLY_BOUND)
106 
107 #define	IPCL_IS_TCP(connp)						\
108 	((connp)->conn_flags & (IPCL_TCP4|IPCL_TCP6))
109 
110 /*
111  * IPCL_UDP is set on the conn when udp is directly above ip;
112  * this flag is cleared the moment udp is popped.
113  */
114 #define	IPCL_IS_UDP(connp)						\
115 	((connp)->conn_flags & IPCL_UDP)
116 
117 #define	IPCL_IS_IPTUN(connp)						\
118 	((connp)->conn_ulp == IPPROTO_ENCAP || \
119 	(connp)->conn_ulp == IPPROTO_IPV6)
120 
121 typedef struct connf_s connf_t;
122 typedef struct
123 {
124 	int	ctb_depth;
125 #define	IP_STACK_DEPTH	15
126 	pc_t	ctb_stack[IP_STACK_DEPTH];
127 } conn_trace_t;
128 
129 struct conn_s {
130 	kmutex_t	conn_lock;
131 	uint32_t	conn_ref;		/* Reference counter */
132 	uint_t		conn_state_flags;	/* IP state flags */
133 	ire_t		*conn_ire_cache; 	/* outbound ire cache */
134 	uint32_t	conn_flags;		/* Conn Flags */
135 	unsigned int
136 		conn_on_sqp : 1,		/* Conn is being processed */
137 		conn_dontroute : 1,		/* SO_DONTROUTE state */
138 		conn_loopback : 1,		/* SO_LOOPBACK state */
139 		conn_broadcast : 1,		/* SO_BROADCAST state */
140 
141 		conn_reuseaddr : 1,		/* SO_REUSEADDR state */
142 		conn_multicast_loop : 1,	/* IP_MULTICAST_LOOP */
143 		conn_multi_router : 1,		/* Wants all multicast pkts */
144 		conn_draining : 1,		/* ip_wsrv running */
145 
146 		conn_did_putbq : 1,		/* ip_wput did a putbq */
147 		conn_unspec_src : 1,		/* IP_UNSPEC_SRC */
148 		conn_policy_cached : 1,		/* Is policy cached/latched ? */
149 		conn_in_enforce_policy : 1,	/* Enforce Policy on inbound */
150 
151 		conn_out_enforce_policy : 1,	/* Enforce Policy on outbound */
152 		conn_af_isv6 : 1,		/* ip address family ver 6 */
153 		conn_pkt_isv6 : 1,		/* ip packet format ver 6 */
154 		conn_ipv6_recvpktinfo : 1,	/* IPV6_RECVPKTINFO option */
155 
156 		conn_ipv6_recvhoplimit : 1,	/* IPV6_RECVHOPLIMIT option */
157 		conn_ipv6_recvhopopts : 1,	/* IPV6_RECVHOPOPTS option */
158 		conn_ipv6_recvdstopts : 1,	/* IPV6_RECVDSTOPTS option */
159 		conn_ipv6_recvrthdr : 1,	/* IPV6_RECVRTHDR option */
160 
161 		conn_ipv6_recvrtdstopts : 1,	/* IPV6_RECVRTHDRDSTOPTS */
162 		conn_ipv6_v6only : 1,		/* IPV6_V6ONLY */
163 		conn_ipv6_recvtclass : 1,	/* IPV6_RECVTCLASS */
164 		conn_ipv6_recvpathmtu : 1,	/* IPV6_RECVPATHMTU */
165 
166 		conn_pathmtu_valid : 1,		/* The cached mtu is valid. */
167 		conn_ipv6_dontfrag : 1,		/* IPV6_DONTFRAG */
168 		/*
169 		 * This option can take on values in [-1, 1] so we store it
170 		 * +1.  Manifest constants IPV6_USE_MIN_MTU_* describe these
171 		 * values.
172 		 */
173 		conn_fully_bound : 1,		/* Fully bound connection */
174 		conn_recvif : 1,		/* IP_RECVIF option */
175 
176 		conn_recvslla : 1,		/* IP_RECVSLLA option */
177 		conn_mdt_ok : 1,		/* MDT is permitted */
178 		conn_nexthop_set : 1,
179 		pad_to_bit_31 : 1;
180 
181 	tcp_t		*conn_tcp;		/* Pointer to the tcp struct */
182 	struct udp_s	*conn_udp;		/* Pointer to the udp struct */
183 
184 	squeue_t	*conn_sqp;		/* Squeue for processing */
185 	edesc_rpf	conn_recv;		/* Pointer to recv routine */
186 	void		*conn_pad1;
187 
188 	ill_t		*conn_xmit_if_ill;	/* Outbound ill */
189 	ill_t		*conn_nofailover_ill;	/* Failover ill */
190 	ipsec_latch_t	*conn_latch;		/* latched state */
191 	ill_t		*conn_outgoing_ill;	/* IP{,V6}_BOUND_IF */
192 	edesc_spf	conn_send;		/* Pointer to send routine */
193 	queue_t		*conn_rq;		/* Read queue */
194 	queue_t		*conn_wq;		/* Write queue */
195 	dev_t		conn_dev;		/* Minor number */
196 
197 	cred_t		*conn_cred;		/* Credentials */
198 	connf_t		*conn_g_fanout;		/* Global Hash bucket head */
199 	struct conn_s	*conn_g_next;		/* Global Hash chain next */
200 	struct conn_s	*conn_g_prev;		/* Global Hash chain prev */
201 	struct ipsec_policy_head_s *conn_policy; /* Configured policy */
202 	in6_addr_t	conn_bound_source_v6;
203 #define	conn_bound_source	V4_PART_OF_V6(conn_bound_source_v6)
204 	void		*conn_void[1];
205 
206 	connf_t		*conn_fanout;		/* Hash bucket we're part of */
207 	struct conn_s	*conn_next;		/* Hash chain next */
208 	struct conn_s	*conn_prev;		/* Hash chain prev */
209 	struct {
210 		in6_addr_t connua_laddr;	/* Local address */
211 		in6_addr_t connua_faddr;	/* Remote address */
212 	} connua_v6addr;
213 #define	conn_src	V4_PART_OF_V6(connua_v6addr.connua_laddr)
214 #define	conn_rem	V4_PART_OF_V6(connua_v6addr.connua_faddr)
215 #define	conn_srcv6	connua_v6addr.connua_laddr
216 #define	conn_remv6	connua_v6addr.connua_faddr
217 	union {
218 		/* Used for classifier match performance */
219 		uint32_t		conn_ports2;
220 		struct {
221 			in_port_t	tcpu_fport;	/* Remote port */
222 			in_port_t	tcpu_lport;	/* Local port */
223 		} tcpu_ports;
224 	} u_port;
225 #define	conn_fport	u_port.tcpu_ports.tcpu_fport
226 #define	conn_lport	u_port.tcpu_ports.tcpu_lport
227 #define	conn_ports	u_port.conn_ports2
228 #define	conn_upq	conn_rq
229 	uint8_t		conn_ulp;		/* protocol type */
230 	uint8_t		conn_unused_byte;
231 	kcondvar_t	conn_cv;
232 
233 	uint_t		conn_proto;		/* SO_PROTOTYPE state */
234 	ill_t		*conn_incoming_ill;	/* IP{,V6}_BOUND_IF */
235 	ill_t		*conn_outgoing_pill;	/* IP{,V6}_BOUND_PIF */
236 	ill_t		*conn_oper_pending_ill; /* pending shared ioctl */
237 	ill_t		*conn_xioctl_pending_ill; /* pending excl ioctl */
238 
239 	/* this is used only when an unbind is in progress.. */
240 	struct sq_s	*conn_pending_sq; /* waiting for ioctl on sq */
241 	ilg_t	*conn_ilg;		/* Group memberships */
242 	int	conn_ilg_allocated;	/* Number allocated */
243 	int	conn_ilg_inuse;		/* Number currently used */
244 	int	conn_ilg_walker_cnt;	/* No of ilg walkers */
245 	/* XXXX get rid of this, once ilg_delete_all is fixed */
246 	kcondvar_t	conn_refcv;
247 
248 	struct ipif_s	*conn_multicast_ipif;	/* IP_MULTICAST_IF */
249 	ill_t		*conn_multicast_ill;	/* IPV6_MULTICAST_IF */
250 	int		conn_orig_bound_ifindex; /* BOUND_IF before MOVE */
251 	int		conn_orig_multicast_ifindex;
252 						/* IPv6 MC IF before MOVE */
253 	int		conn_orig_xmit_ifindex; /* IP_XMIT_IF before move */
254 	struct conn_s 	*conn_drain_next;	/* Next conn in drain list */
255 	struct conn_s	*conn_drain_prev;	/* Prev conn in drain list */
256 	idl_t		*conn_idl;		/* Ptr to the drain list head */
257 	mblk_t		*conn_ipsec_opt_mp;	/* ipsec option mblk */
258 	uint32_t	conn_src_preferences;	/* prefs for src addr select */
259 	/* mtuinfo from IPV6_PACKET_TOO_BIG conditional on conn_pathmtu_valid */
260 	struct ip6_mtuinfo mtuinfo;
261 	zoneid_t	conn_zoneid;		/* zone connection is in */
262 	in6_addr_t	conn_nexthop_v6;	/* nexthop IP address */
263 #define	conn_nexthop_v4	V4_PART_OF_V6(conn_nexthop_v6)
264 	cred_t		*conn_peercred;		/* Peer credentials, if any */
265 
266 	unsigned int
267 		conn_ulp_labeled : 1,		/* ULP label is synced */
268 		conn_mlp_type : 2,		/* mlp_type_t; tsol/tndb.h */
269 		conn_anon_mlp : 1,		/* user wants anon MLP */
270 
271 		conn_anon_port : 1,		/* user bound anonymously */
272 		conn_mac_exempt : 1,		/* unlabeled with loose MAC */
273 		conn_spare : 26;
274 
275 #ifdef CONN_DEBUG
276 #define	CONN_TRACE_MAX	10
277 	int		conn_trace_last;	/* ndx of last used tracebuf */
278 	conn_trace_t	conn_trace_buf[CONN_TRACE_MAX];
279 #endif
280 };
281 
282 #define	CONN_CRED(connp) ((connp)->conn_peercred == NULL ? \
283 	(connp)->conn_cred : (connp)->conn_peercred)
284 #define	BEST_CRED(mp, connp) ((DB_CRED(mp) != NULL &&	\
285 	crgetlabel(DB_CRED(mp)) != NULL) ? DB_CRED(mp) : CONN_CRED(connp))
286 
287 /*
288  * connf_t - connection fanout data.
289  *
290  * The hash tables and their linkage (conn_t.{hashnextp, hashprevp} are
291  * protected by the per-bucket lock. Each conn_t inserted in the list
292  * points back at the connf_t that heads the bucket.
293  */
294 
295 struct connf_s {
296 	struct conn_s	*connf_head;
297 	kmutex_t	connf_lock;
298 };
299 
300 #define	CONN_INC_REF(connp)	{				\
301 	DTRACE_PROBE1(conn__inc__ref, conn_t *, connp);		\
302 	mutex_enter(&(connp)->conn_lock);			\
303 	ASSERT(conn_trace_ref(connp));				\
304 	(connp)->conn_ref++;					\
305 	ASSERT((connp)->conn_ref != 0);				\
306 	mutex_exit(&(connp)->conn_lock);			\
307 }
308 
309 #define	CONN_INC_REF_LOCKED(connp)	{			\
310 	DTRACE_PROBE1(conn__inc__ref, conn_t *, connp);		\
311 	ASSERT(MUTEX_HELD(&(connp)->conn_lock));	 	\
312 	ASSERT(conn_trace_ref(connp));				\
313 	(connp)->conn_ref++;					\
314 	ASSERT((connp)->conn_ref != 0);				\
315 }
316 
317 #define	CONN_DEC_REF(connp)	{					\
318 	DTRACE_PROBE1(conn__dec__ref, conn_t *, connp);			\
319 	mutex_enter(&(connp)->conn_lock);				\
320 	if ((connp)->conn_ref <= 0)					\
321 		cmn_err(CE_PANIC, "CONN_DEC_REF: connp(%p) has ref "	\
322 			"= %d\n", (void *)(connp), (connp)->conn_ref);	\
323 	ASSERT(conn_untrace_ref(connp));				\
324 	(connp)->conn_ref--;						\
325 	if ((connp)->conn_ref == 0) {					\
326 		/* Refcnt can't increase again, safe to drop lock */	\
327 		mutex_exit(&(connp)->conn_lock);			\
328 		ipcl_conn_destroy(connp);				\
329 	} else {							\
330 		cv_broadcast(&(connp)->conn_cv);			\
331 		mutex_exit(&(connp)->conn_lock);			\
332 	}								\
333 }
334 
335 #define	_IPCL_V4_MATCH(v6addr, v4addr)	\
336 	(V4_PART_OF_V6((v6addr)) == (v4addr) && IN6_IS_ADDR_V4MAPPED(&(v6addr)))
337 
338 #define	_IPCL_V4_MATCH_ANY(addr)	\
339 	(IN6_IS_ADDR_V4MAPPED_ANY(&(addr)) || IN6_IS_ADDR_UNSPECIFIED(&(addr)))
340 
341 /*
342  * IPCL_PROTO_MATCH() only matches conns with the specified zoneid, while
343  * IPCL_PROTO_MATCH_V6() can match other conns in the multicast case, see
344  * ip_fanout_proto().
345  */
346 #define	IPCL_PROTO_MATCH(connp, protocol, ipha, ill,			\
347     fanout_flags, zoneid)						\
348 	((((connp)->conn_src == INADDR_ANY) ||				\
349 	(((connp)->conn_src == ((ipha)->ipha_dst)) &&			\
350 	(((connp)->conn_rem == INADDR_ANY) ||				\
351 	((connp)->conn_rem == ((ipha)->ipha_src))))) &&			\
352 	((zoneid) == ALL_ZONES || (connp)->conn_zoneid == (zoneid)) &&	\
353 	(conn_wantpacket((connp), (ill), (ipha),			\
354 	(fanout_flags), (zoneid)) || ((protocol) == IPPROTO_PIM) ||	\
355 	((protocol) == IPPROTO_RSVP)))
356 
357 #define	IPCL_PROTO_MATCH_V6(connp, protocol, ip6h, ill,			   \
358     fanout_flags, zoneid)						   \
359 	((IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_srcv6) ||		   \
360 	(IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &((ip6h)->ip6_dst)) &&   \
361 	(IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_remv6) ||		   \
362 	IN6_ARE_ADDR_EQUAL(&(connp)->conn_remv6, &((ip6h)->ip6_src))))) && \
363 	(conn_wantpacket_v6((connp), (ill), (ip6h),			   \
364 	(fanout_flags), (zoneid)) || ((protocol) == IPPROTO_RSVP)))
365 
366 #define	IPCL_CONN_HASH(src, ports)					\
367 	((unsigned)(ntohl((src)) ^ ((ports) >> 24) ^ ((ports) >> 16) ^	\
368 	((ports) >> 8) ^ (ports)) % ipcl_conn_fanout_size)
369 
370 #define	IPCL_CONN_HASH_V6(src, ports)			\
371 	IPCL_CONN_HASH(V4_PART_OF_V6((src)), (ports))
372 
373 #define	IPCL_CONN_MATCH(connp, proto, src, dst, ports)			\
374 	((connp)->conn_ulp == (proto) &&				\
375 		(connp)->conn_ports == (ports) &&      			\
376 		_IPCL_V4_MATCH((connp)->conn_remv6, (src)) &&		\
377 		_IPCL_V4_MATCH((connp)->conn_srcv6, (dst)) &&		\
378 		!(connp)->conn_ipv6_v6only)
379 
380 #define	IPCL_CONN_MATCH_V6(connp, proto, src, dst, ports)		\
381 	((connp)->conn_ulp == (proto) &&				\
382 		(connp)->conn_ports == (ports) &&      			\
383 		IN6_ARE_ADDR_EQUAL(&(connp)->conn_remv6, &(src)) &&	\
384 		IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &(dst)))
385 
386 #define	IPCL_CONN_INIT(connp, protocol, src, rem, ports) {		\
387 	(connp)->conn_ulp = protocol;					\
388 	IN6_IPADDR_TO_V4MAPPED(src, &(connp)->conn_srcv6);		\
389 	IN6_IPADDR_TO_V4MAPPED(rem, &(connp)->conn_remv6);		\
390 	(connp)->conn_ports = ports;					\
391 }
392 
393 #define	IPCL_CONN_INIT_V6(connp, protocol, src, rem, ports) {		\
394 	(connp)->conn_ulp = protocol;					\
395 	(connp)->conn_srcv6 = src;					\
396 	(connp)->conn_remv6 = rem;					\
397 	(connp)->conn_ports = ports;					\
398 }
399 
400 #define	IPCL_PORT_HASH(port, size) \
401 	((((port) >> 8) ^ (port)) & ((size) - 1))
402 
403 #define	IPCL_BIND_HASH(lport)	IPCL_PORT_HASH(lport, ipcl_bind_fanout_size)
404 
405 #define	IPCL_BIND_MATCH(connp, proto, laddr, lport)			\
406 	((connp)->conn_ulp == (proto) &&				\
407 		(connp)->conn_lport == (lport) &&			\
408 		(_IPCL_V4_MATCH_ANY((connp)->conn_srcv6) ||		\
409 		_IPCL_V4_MATCH((connp)->conn_srcv6, (laddr))) &&	\
410 		!(connp)->conn_ipv6_v6only)
411 
412 #define	IPCL_BIND_MATCH_V6(connp, proto, laddr, lport)			\
413 	((connp)->conn_ulp == (proto) &&				\
414 		(connp)->conn_lport == (lport) &&			\
415 		(IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &(laddr)) ||	\
416 		IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_srcv6)))
417 
418 #define	IPCL_UDP_MATCH(connp, lport, laddr, fport, faddr)		\
419 	(((connp)->conn_lport == (lport)) &&				\
420 	((_IPCL_V4_MATCH_ANY((connp)->conn_srcv6) ||			\
421 	(_IPCL_V4_MATCH((connp)->conn_srcv6, (laddr)) &&		\
422 	(_IPCL_V4_MATCH_ANY((connp)->conn_remv6) ||			\
423 	(_IPCL_V4_MATCH((connp)->conn_remv6, (faddr)) &&		\
424 	(connp)->conn_fport == (fport)))))) &&				\
425 	!(connp)->conn_ipv6_v6only)
426 
427 #define	IPCL_UDP_MATCH_V6(connp, lport, laddr, fport, faddr)	\
428 	(((connp)->conn_lport == (lport)) &&			\
429 	(IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_srcv6) ||	\
430 	(IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &(laddr)) &&	\
431 	(IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_remv6) ||	\
432 	(IN6_ARE_ADDR_EQUAL(&(connp)->conn_remv6, &(faddr)) &&	\
433 	(connp)->conn_fport == (fport))))))
434 
435 #define	IPCL_TCP_EAGER_INIT(connp, protocol, src, rem, ports) {		\
436 	(connp)->conn_flags |= (IPCL_TCP4|IPCL_EAGER);			\
437 	(connp)->conn_ulp = protocol;					\
438 	IN6_IPADDR_TO_V4MAPPED(src, &(connp)->conn_srcv6);		\
439 	IN6_IPADDR_TO_V4MAPPED(rem, &(connp)->conn_remv6);		\
440 	(connp)->conn_ports = ports;					\
441 	(connp)->conn_send = ip_output;					\
442 	(connp)->conn_sqp = IP_SQUEUE_GET(lbolt);			\
443 }
444 
445 #define	IPCL_TCP_EAGER_INIT_V6(connp, protocol, src, rem, ports) {	\
446 	(connp)->conn_flags |= (IPCL_TCP6|IPCL_EAGER);			\
447 	(connp)->conn_ulp = protocol;					\
448 	(connp)->conn_srcv6 = src;					\
449 	(connp)->conn_remv6 = rem;					\
450 	(connp)->conn_ports = ports;					\
451 	(connp)->conn_send = ip_output_v6;				\
452 	(connp)->conn_sqp = IP_SQUEUE_GET(lbolt);			\
453 }
454 
455 #define	ipcl_proto_search(protocol)					\
456 	(ipcl_proto_fanout[(protocol)].connf_head)
457 
458 #define	IPCL_UDP_HASH(lport)	IPCL_PORT_HASH(lport, ipcl_udp_fanout_size)
459 
460 #define	CONN_G_HASH_SIZE	1024
461 
462 /* Raw socket hash function. */
463 #define	IPCL_RAW_HASH(lport)	IPCL_PORT_HASH(lport, ipcl_raw_fanout_size)
464 
465 /*
466  * This is similar to IPCL_BIND_MATCH except that the local port check
467  * is changed to a wildcard port check.
468  */
469 #define	IPCL_RAW_MATCH(connp, proto, laddr)			\
470 	((connp)->conn_ulp == (proto) &&			\
471 	(connp)->conn_lport == 0 &&				\
472 	(_IPCL_V4_MATCH_ANY((connp)->conn_srcv6) ||		\
473 	_IPCL_V4_MATCH((connp)->conn_srcv6, (laddr))))
474 
475 #define	IPCL_RAW_MATCH_V6(connp, proto, laddr)			\
476 	((connp)->conn_ulp == (proto) &&			\
477 	(connp)->conn_lport == 0 &&				\
478 	(IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_srcv6) ||	\
479 	IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &(laddr))))
480 
481 /* hash tables */
482 extern connf_t	rts_clients;
483 extern connf_t	*ipcl_conn_fanout;
484 extern connf_t	*ipcl_bind_fanout;
485 extern connf_t	ipcl_proto_fanout[IPPROTO_MAX + 1];
486 extern connf_t	ipcl_proto_fanout_v6[IPPROTO_MAX + 1];
487 extern connf_t	*ipcl_udp_fanout;
488 extern connf_t	*ipcl_globalhash_fanout;
489 extern connf_t	*ipcl_raw_fanout;
490 extern uint_t	ipcl_conn_fanout_size;
491 extern uint_t	ipcl_bind_fanout_size;
492 extern uint_t	ipcl_udp_fanout_size;
493 extern uint_t	ipcl_raw_fanout_size;
494 
495 /* Function prototypes */
496 extern void ipcl_init(void);
497 extern void ipcl_destroy(void);
498 extern conn_t *ipcl_conn_create(uint32_t, int);
499 extern void ipcl_conn_destroy(conn_t *);
500 
501 void ipcl_hash_insert_connected(connf_t *, conn_t *);
502 void ipcl_hash_insert_bound(connf_t *, conn_t *);
503 void ipcl_hash_insert_wildcard(connf_t *, conn_t *);
504 void ipcl_hash_remove(conn_t *);
505 void ipcl_hash_remove_locked(conn_t *connp, connf_t *connfp);
506 
507 extern int	ipcl_bind_insert(conn_t *, uint8_t, ipaddr_t, uint16_t);
508 extern int	ipcl_bind_insert_v6(conn_t *, uint8_t, const in6_addr_t *,
509 		    uint16_t);
510 extern int	ipcl_conn_insert(conn_t *, uint8_t, ipaddr_t, ipaddr_t,
511 		    uint32_t);
512 extern int	ipcl_conn_insert_v6(conn_t *, uint8_t, const in6_addr_t *,
513 		    const in6_addr_t *, uint32_t, uint_t);
514 extern conn_t	*ipcl_get_next_conn(connf_t *, conn_t *, uint32_t);
515 
516 void ipcl_proto_insert(conn_t *, uint8_t);
517 void ipcl_proto_insert_v6(conn_t *, uint8_t);
518 conn_t *ipcl_classify_v4(mblk_t *, uint8_t, uint_t, zoneid_t);
519 conn_t *ipcl_classify_v6(mblk_t *, uint8_t, uint_t, zoneid_t);
520 conn_t *ipcl_classify(mblk_t *, zoneid_t);
521 conn_t *ipcl_classify_raw(mblk_t *, uint8_t, zoneid_t, uint32_t, ipha_t *);
522 void	ipcl_globalhash_insert(conn_t *);
523 void	ipcl_globalhash_remove(conn_t *);
524 void	ipcl_walk(pfv_t, void *);
525 conn_t	*ipcl_tcp_lookup_reversed_ipv4(ipha_t *, tcph_t *, int);
526 conn_t	*ipcl_tcp_lookup_reversed_ipv6(ip6_t *, tcpha_t *, int, uint_t);
527 conn_t	*ipcl_lookup_listener_v4(uint16_t, ipaddr_t, zoneid_t);
528 conn_t	*ipcl_lookup_listener_v6(uint16_t, in6_addr_t *, uint_t, zoneid_t);
529 int	conn_trace_ref(conn_t *);
530 int	conn_untrace_ref(conn_t *);
531 conn_t *ipcl_conn_tcp_lookup_reversed_ipv4(conn_t *, ipha_t *, tcph_t *);
532 conn_t *ipcl_conn_tcp_lookup_reversed_ipv6(conn_t *, ip6_t *, tcph_t *);
533 #ifdef	__cplusplus
534 }
535 #endif
536 
537 #endif	/* _INET_IPCLASSIFIER_H */
538