1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #ifndef _INET_IPCLASSIFIER_H 27 #define _INET_IPCLASSIFIER_H 28 29 #ifdef __cplusplus 30 extern "C" { 31 #endif 32 33 #include <inet/common.h> 34 #include <inet/ip.h> 35 #include <inet/mi.h> 36 #include <inet/tcp.h> 37 #include <inet/ip6.h> 38 #include <netinet/in.h> /* for IPPROTO_* constants */ 39 #include <sys/sdt.h> 40 #include <sys/socket_proto.h> 41 #include <sys/sunddi.h> 42 #include <sys/sunldi.h> 43 44 typedef void (*edesc_spf)(void *, mblk_t *, void *, int); 45 typedef void (*edesc_rpf)(void *, mblk_t *, void *); 46 47 /* 48 * ============================== 49 * = The CONNECTION = 50 * ============================== 51 */ 52 53 /* 54 * The connection structure contains the common information/flags/ref needed. 55 * Implementation will keep the connection struct, the layers (with their 56 * respective data for event i.e. tcp_t if event was tcp_input) all in one 57 * contiguous memory location. 58 */ 59 60 /* Conn Flags */ 61 /* Unused 0x00020000 */ 62 /* Unused 0x00040000 */ 63 #define IPCL_FULLY_BOUND 0x00080000 /* Bound to correct squeue */ 64 #define IPCL_CHECK_POLICY 0x00100000 /* Needs policy checking */ 65 #define IPCL_SOCKET 0x00200000 /* Sockfs connection */ 66 #define IPCL_ACCEPTOR 0x00400000 /* Sockfs priv acceptor */ 67 #define IPCL_CL_LISTENER 0x00800000 /* Cluster listener */ 68 #define IPCL_EAGER 0x01000000 /* Incoming connection */ 69 /* Unused 0x02000000 */ 70 #define IPCL_TCP6 0x04000000 /* AF_INET6 TCP */ 71 #define IPCL_TCP4 0x08000000 /* IPv4 packet format TCP */ 72 /* Unused 0x10000000 */ 73 /* Unused 0x20000000 */ 74 #define IPCL_CONNECTED 0x40000000 /* Conn in connected table */ 75 #define IPCL_BOUND 0x80000000 /* Conn in bind table */ 76 77 /* Flags identifying the type of conn */ 78 #define IPCL_TCPCONN 0x00000001 /* From tcp_conn_cache */ 79 #define IPCL_SCTPCONN 0x00000002 /* From sctp_conn_cache */ 80 #define IPCL_IPCCONN 0x00000004 /* From ip_conn_cache */ 81 #define IPCL_UDPCONN 0x00000008 /* From udp_conn_cache */ 82 #define IPCL_RAWIPCONN 0x00000010 /* From rawip_conn_cache */ 83 #define IPCL_RTSCONN 0x00000020 /* From rts_conn_cache */ 84 #define IPCL_ISV6 0x00000040 /* AF_INET6 */ 85 #define IPCL_IPTUN 0x00000080 /* Has "tun" plumbed above it */ 86 #define IPCL_NONSTR 0x00001000 /* A non-STREAMS socket */ 87 #define IPCL_IN_SQUEUE 0x10000000 /* Waiting squeue to finish */ 88 89 /* Conn Masks */ 90 #define IPCL_TCP (IPCL_TCP4|IPCL_TCP6) 91 #define IPCL_REMOVED 0x00000100 92 #define IPCL_REUSED 0x00000200 93 94 /* The packet format is IPv4; could be an AF_INET or AF_INET6 socket */ 95 #define IPCL_IS_TCP4(connp) \ 96 (((connp)->conn_flags & IPCL_TCP4)) 97 98 /* Connected AF_INET with no IPsec policy */ 99 #define IPCL_IS_TCP4_CONNECTED_NO_POLICY(connp) \ 100 (((connp)->conn_flags & \ 101 (IPCL_TCP4|IPCL_CONNECTED|IPCL_CHECK_POLICY|IPCL_TCP6)) \ 102 == (IPCL_TCP4|IPCL_CONNECTED)) 103 104 #define IPCL_IS_CONNECTED(connp) \ 105 ((connp)->conn_flags & IPCL_CONNECTED) 106 107 #define IPCL_IS_BOUND(connp) \ 108 ((connp)->conn_flags & IPCL_BOUND) 109 110 /* AF_INET TCP that is bound */ 111 #define IPCL_IS_TCP4_BOUND(connp) \ 112 (((connp)->conn_flags & \ 113 (IPCL_TCP4|IPCL_BOUND|IPCL_TCP6)) == \ 114 (IPCL_TCP4|IPCL_BOUND)) 115 116 #define IPCL_IS_FULLY_BOUND(connp) \ 117 ((connp)->conn_flags & IPCL_FULLY_BOUND) 118 119 /* 120 * Can't use conn_protocol since we need to tell difference 121 * between a real TCP socket and a SOCK_RAW, IPPROTO_TCP. 122 */ 123 #define IPCL_IS_TCP(connp) \ 124 ((connp)->conn_flags & IPCL_TCPCONN) 125 126 #define IPCL_IS_SCTP(connp) \ 127 ((connp)->conn_flags & IPCL_SCTPCONN) 128 129 #define IPCL_IS_UDP(connp) \ 130 ((connp)->conn_flags & IPCL_UDPCONN) 131 132 #define IPCL_IS_RAWIP(connp) \ 133 ((connp)->conn_flags & IPCL_RAWIPCONN) 134 135 #define IPCL_IS_RTS(connp) \ 136 ((connp)->conn_flags & IPCL_RTSCONN) 137 138 #define IPCL_IS_IPTUN(connp) \ 139 (((connp)->conn_ulp == IPPROTO_ENCAP || \ 140 (connp)->conn_ulp == IPPROTO_IPV6) && \ 141 ((connp)->conn_flags & IPCL_IPTUN)) 142 143 #define IPCL_IS_NONSTR(connp) ((connp)->conn_flags & IPCL_NONSTR) 144 145 typedef struct connf_s connf_t; 146 147 typedef struct 148 { 149 int ctb_depth; 150 #define CONN_STACK_DEPTH 15 151 pc_t ctb_stack[CONN_STACK_DEPTH]; 152 } conn_trace_t; 153 154 typedef struct ip_helper_minor_info_s { 155 dev_t ip_minfo_dev; /* Device */ 156 vmem_t *ip_minfo_arena; /* Arena */ 157 } ip_helper_minfo_t; 158 159 /* 160 * ip helper stream info 161 */ 162 typedef struct ip_helper_stream_info_s { 163 ldi_handle_t iphs_handle; 164 queue_t *iphs_rq; 165 queue_t *iphs_wq; 166 ip_helper_minfo_t *iphs_minfo; 167 } ip_helper_stream_info_t; 168 169 /* 170 * The initial fields in the conn_t are setup by the kmem_cache constructor, 171 * and are preserved when it is freed. Fields after that are bzero'ed when 172 * the conn_t is freed. 173 */ 174 struct conn_s { 175 kmutex_t conn_lock; 176 uint32_t conn_ref; /* Reference counter */ 177 uint32_t conn_flags; /* Conn Flags */ 178 179 180 union { 181 tcp_t *cp_tcp; /* Pointer to the tcp struct */ 182 struct udp_s *cp_udp; /* Pointer to the udp struct */ 183 struct icmp_s *cp_icmp; /* Pointer to rawip struct */ 184 struct rts_s *cp_rts; /* Pointer to rts struct */ 185 void *cp_priv; 186 } conn_proto_priv; 187 #define conn_tcp conn_proto_priv.cp_tcp 188 #define conn_udp conn_proto_priv.cp_udp 189 #define conn_icmp conn_proto_priv.cp_icmp 190 #define conn_rts conn_proto_priv.cp_rts 191 #define conn_priv conn_proto_priv.cp_priv 192 193 kcondvar_t conn_cv; 194 uint8_t conn_ulp; /* protocol type */ 195 196 edesc_rpf conn_recv; /* Pointer to recv routine */ 197 198 /* Fields after this are bzero'ed when the conn_t is freed. */ 199 200 squeue_t *conn_sqp; /* Squeue for processing */ 201 uint_t conn_state_flags; /* IP state flags */ 202 #define conn_start_clr conn_state_flags 203 204 ire_t *conn_ire_cache; /* outbound ire cache */ 205 unsigned int 206 conn_on_sqp : 1, /* Conn is being processed */ 207 conn_dontroute : 1, /* SO_DONTROUTE state */ 208 conn_loopback : 1, /* SO_LOOPBACK state */ 209 conn_broadcast : 1, /* SO_BROADCAST state */ 210 211 conn_reuseaddr : 1, /* SO_REUSEADDR state */ 212 conn_multicast_loop : 1, /* IP_MULTICAST_LOOP */ 213 conn_multi_router : 1, /* Wants all multicast pkts */ 214 conn_draining : 1, /* ip_wsrv running */ 215 216 conn_did_putbq : 1, /* ip_wput did a putbq */ 217 conn_unspec_src : 1, /* IP_UNSPEC_SRC */ 218 conn_policy_cached : 1, /* Is policy cached/latched ? */ 219 conn_in_enforce_policy : 1, /* Enforce Policy on inbound */ 220 221 conn_out_enforce_policy : 1, /* Enforce Policy on outbound */ 222 conn_af_isv6 : 1, /* ip address family ver 6 */ 223 conn_pkt_isv6 : 1, /* ip packet format ver 6 */ 224 conn_ip_recvpktinfo : 1, /* IPV*_RECVPKTINFO option */ 225 226 conn_ipv6_recvhoplimit : 1, /* IPV6_RECVHOPLIMIT option */ 227 conn_ipv6_recvhopopts : 1, /* IPV6_RECVHOPOPTS option */ 228 conn_ipv6_recvdstopts : 1, /* IPV6_RECVDSTOPTS option */ 229 conn_ipv6_recvrthdr : 1, /* IPV6_RECVRTHDR option */ 230 231 conn_ipv6_recvrtdstopts : 1, /* IPV6_RECVRTHDRDSTOPTS */ 232 conn_ipv6_v6only : 1, /* IPV6_V6ONLY */ 233 conn_ipv6_recvtclass : 1, /* IPV6_RECVTCLASS */ 234 conn_ipv6_recvpathmtu : 1, /* IPV6_RECVPATHMTU */ 235 236 conn_pathmtu_valid : 1, /* The cached mtu is valid. */ 237 conn_ipv6_dontfrag : 1, /* IPV6_DONTFRAG */ 238 conn_fully_bound : 1, /* Fully bound connection */ 239 conn_recvif : 1, /* IP_RECVIF option */ 240 241 conn_recvslla : 1, /* IP_RECVSLLA option */ 242 conn_mdt_ok : 1, /* MDT is permitted */ 243 conn_nexthop_set : 1, 244 conn_allzones : 1; /* SO_ALLZONES */ 245 246 unsigned int 247 conn_lso_ok : 1; /* LSO is usable */ 248 249 squeue_t *conn_initial_sqp; /* Squeue at open time */ 250 squeue_t *conn_final_sqp; /* Squeue after connect */ 251 ill_t *conn_dhcpinit_ill; /* IP_DHCPINIT_IF */ 252 ipsec_latch_t *conn_latch; /* latched state */ 253 ill_t *conn_outgoing_ill; /* IP{,V6}_BOUND_IF */ 254 edesc_spf conn_send; /* Pointer to send routine */ 255 queue_t *conn_rq; /* Read queue */ 256 queue_t *conn_wq; /* Write queue */ 257 dev_t conn_dev; /* Minor number */ 258 vmem_t *conn_minor_arena; /* Minor arena */ 259 ip_helper_stream_info_t *conn_helper_info; 260 261 cred_t *conn_cred; /* Credentials */ 262 connf_t *conn_g_fanout; /* Global Hash bucket head */ 263 struct conn_s *conn_g_next; /* Global Hash chain next */ 264 struct conn_s *conn_g_prev; /* Global Hash chain prev */ 265 struct ipsec_policy_head_s *conn_policy; /* Configured policy */ 266 in6_addr_t conn_bound_source_v6; 267 #define conn_bound_source V4_PART_OF_V6(conn_bound_source_v6) 268 269 connf_t *conn_fanout; /* Hash bucket we're part of */ 270 struct conn_s *conn_next; /* Hash chain next */ 271 struct conn_s *conn_prev; /* Hash chain prev */ 272 struct { 273 in6_addr_t connua_laddr; /* Local address */ 274 in6_addr_t connua_faddr; /* Remote address */ 275 } connua_v6addr; 276 #define conn_src V4_PART_OF_V6(connua_v6addr.connua_laddr) 277 #define conn_rem V4_PART_OF_V6(connua_v6addr.connua_faddr) 278 #define conn_srcv6 connua_v6addr.connua_laddr 279 #define conn_remv6 connua_v6addr.connua_faddr 280 union { 281 /* Used for classifier match performance */ 282 uint32_t conn_ports2; 283 struct { 284 in_port_t tcpu_fport; /* Remote port */ 285 in_port_t tcpu_lport; /* Local port */ 286 } tcpu_ports; 287 } u_port; 288 #define conn_fport u_port.tcpu_ports.tcpu_fport 289 #define conn_lport u_port.tcpu_ports.tcpu_lport 290 #define conn_ports u_port.conn_ports2 291 #define conn_upq conn_rq 292 uint8_t conn_unused_byte; 293 294 uint_t conn_proto; /* SO_PROTOTYPE state */ 295 ill_t *conn_incoming_ill; /* IP{,V6}_BOUND_IF */ 296 ill_t *conn_oper_pending_ill; /* pending shared ioctl */ 297 298 ilg_t *conn_ilg; /* Group memberships */ 299 int conn_ilg_allocated; /* Number allocated */ 300 int conn_ilg_inuse; /* Number currently used */ 301 int conn_ilg_walker_cnt; /* No of ilg walkers */ 302 /* XXXX get rid of this, once ilg_delete_all is fixed */ 303 kcondvar_t conn_refcv; 304 305 struct ipif_s *conn_multicast_ipif; /* IP_MULTICAST_IF */ 306 ill_t *conn_multicast_ill; /* IPV6_MULTICAST_IF */ 307 struct conn_s *conn_drain_next; /* Next conn in drain list */ 308 struct conn_s *conn_drain_prev; /* Prev conn in drain list */ 309 idl_t *conn_idl; /* Ptr to the drain list head */ 310 mblk_t *conn_ipsec_opt_mp; /* ipsec option mblk */ 311 uint32_t conn_src_preferences; /* prefs for src addr select */ 312 /* mtuinfo from IPV6_PACKET_TOO_BIG conditional on conn_pathmtu_valid */ 313 struct ip6_mtuinfo mtuinfo; 314 zoneid_t conn_zoneid; /* zone connection is in */ 315 in6_addr_t conn_nexthop_v6; /* nexthop IP address */ 316 uchar_t conn_broadcast_ttl; /* IP_BROADCAST_TTL */ 317 #define conn_nexthop_v4 V4_PART_OF_V6(conn_nexthop_v6) 318 cred_t *conn_peercred; /* Peer TX label, if any */ 319 int conn_rtaware; /* RT_AWARE sockopt value */ 320 kcondvar_t conn_sq_cv; /* For non-STREAMS socket IO */ 321 kthread_t *conn_sq_caller; /* Caller of squeue sync ops */ 322 sock_upcalls_t *conn_upcalls; /* Upcalls to sockfs */ 323 sock_upper_handle_t conn_upper_handle; /* Upper handle: sonode * */ 324 325 unsigned int 326 conn_ulp_labeled : 1, /* ULP label is synced */ 327 conn_mlp_type : 2, /* mlp_type_t; tsol/tndb.h */ 328 conn_anon_mlp : 1, /* user wants anon MLP */ 329 330 conn_anon_port : 1, /* user bound anonymously */ 331 conn_mac_exempt : 1, /* unlabeled with loose MAC */ 332 conn_spare : 26; 333 334 boolean_t conn_flow_cntrld; 335 netstack_t *conn_netstack; /* Corresponds to a netstack_hold */ 336 #ifdef CONN_DEBUG 337 #define CONN_TRACE_MAX 10 338 int conn_trace_last; /* ndx of last used tracebuf */ 339 conn_trace_t conn_trace_buf[CONN_TRACE_MAX]; 340 #endif 341 }; 342 343 /* 344 * These two macros are used by TX. First priority is SCM_UCRED having 345 * set the label in the mblk. Second priority is the peers label (aka 346 * conn_peercred). Last priority is the open credentials. 347 * BEST_CRED takes all three into account in the above order. 348 * CONN_CRED is for connection-oriented cases when we don't need to look 349 * at the mblk. 350 */ 351 #define CONN_CRED(connp) ((connp)->conn_peercred == NULL ? \ 352 (connp)->conn_cred : (connp)->conn_peercred) 353 #define BEST_CRED(mp, connp) ip_best_cred(mp, connp) 354 355 /* 356 * connf_t - connection fanout data. 357 * 358 * The hash tables and their linkage (conn_t.{hashnextp, hashprevp} are 359 * protected by the per-bucket lock. Each conn_t inserted in the list 360 * points back at the connf_t that heads the bucket. 361 */ 362 struct connf_s { 363 struct conn_s *connf_head; 364 kmutex_t connf_lock; 365 }; 366 367 #define CONN_INC_REF(connp) { \ 368 mutex_enter(&(connp)->conn_lock); \ 369 DTRACE_PROBE1(conn__inc__ref, conn_t *, connp); \ 370 ASSERT(conn_trace_ref(connp)); \ 371 (connp)->conn_ref++; \ 372 ASSERT((connp)->conn_ref != 0); \ 373 mutex_exit(&(connp)->conn_lock); \ 374 } 375 376 #define CONN_INC_REF_LOCKED(connp) { \ 377 DTRACE_PROBE1(conn__inc__ref, conn_t *, connp); \ 378 ASSERT(MUTEX_HELD(&(connp)->conn_lock)); \ 379 ASSERT(conn_trace_ref(connp)); \ 380 (connp)->conn_ref++; \ 381 ASSERT((connp)->conn_ref != 0); \ 382 } 383 384 #define CONN_DEC_REF(connp) { \ 385 mutex_enter(&(connp)->conn_lock); \ 386 DTRACE_PROBE1(conn__dec__ref, conn_t *, connp); \ 387 /* \ 388 * The squeue framework always does a CONN_DEC_REF after return \ 389 * from TCP. Hence the refcnt must be at least 2 if conn_on_sqp \ 390 * is B_TRUE and conn_ref is being decremented. This is to \ 391 * account for the mblk being currently processed. \ 392 */ \ 393 if ((connp)->conn_ref <= 0 || \ 394 ((connp)->conn_ref == 1 && (connp)->conn_on_sqp)) \ 395 cmn_err(CE_PANIC, "CONN_DEC_REF: connp(%p) has ref " \ 396 "= %d\n", (void *)(connp), (connp)->conn_ref); \ 397 ASSERT(conn_untrace_ref(connp)); \ 398 (connp)->conn_ref--; \ 399 if ((connp)->conn_ref == 0) { \ 400 /* Refcnt can't increase again, safe to drop lock */ \ 401 mutex_exit(&(connp)->conn_lock); \ 402 ipcl_conn_destroy(connp); \ 403 } else { \ 404 cv_broadcast(&(connp)->conn_cv); \ 405 mutex_exit(&(connp)->conn_lock); \ 406 } \ 407 } 408 409 /* 410 * For use with subsystems within ip which use ALL_ZONES as a wildcard 411 */ 412 #define IPCL_ZONEID(connp) \ 413 ((connp)->conn_allzones ? ALL_ZONES : (connp)->conn_zoneid) 414 415 /* 416 * For matching between a conn_t and a zoneid. 417 */ 418 #define IPCL_ZONE_MATCH(connp, zoneid) \ 419 (((connp)->conn_allzones) || \ 420 ((zoneid) == ALL_ZONES) || \ 421 (connp)->conn_zoneid == (zoneid)) 422 423 424 #define _IPCL_V4_MATCH(v6addr, v4addr) \ 425 (V4_PART_OF_V6((v6addr)) == (v4addr) && IN6_IS_ADDR_V4MAPPED(&(v6addr))) 426 427 #define _IPCL_V4_MATCH_ANY(addr) \ 428 (IN6_IS_ADDR_V4MAPPED_ANY(&(addr)) || IN6_IS_ADDR_UNSPECIFIED(&(addr))) 429 430 431 /* 432 * IPCL_PROTO_MATCH() only matches conns with the specified zoneid, while 433 * IPCL_PROTO_MATCH_V6() can match other conns in the multicast case, see 434 * ip_fanout_proto(). 435 */ 436 #define IPCL_PROTO_MATCH(connp, protocol, ipha, ill, \ 437 fanout_flags, zoneid) \ 438 ((((connp)->conn_src == INADDR_ANY) || \ 439 (((connp)->conn_src == ((ipha)->ipha_dst)) && \ 440 (((connp)->conn_rem == INADDR_ANY) || \ 441 ((connp)->conn_rem == ((ipha)->ipha_src))))) && \ 442 IPCL_ZONE_MATCH(connp, zoneid) && \ 443 (conn_wantpacket((connp), (ill), (ipha), (fanout_flags), \ 444 (zoneid)) || ((protocol) == IPPROTO_PIM) || \ 445 ((protocol) == IPPROTO_RSVP))) 446 447 #define IPCL_PROTO_MATCH_V6(connp, protocol, ip6h, ill, \ 448 fanout_flags, zoneid) \ 449 ((IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_srcv6) || \ 450 (IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &((ip6h)->ip6_dst)) && \ 451 (IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_remv6) || \ 452 IN6_ARE_ADDR_EQUAL(&(connp)->conn_remv6, &((ip6h)->ip6_src))))) && \ 453 (conn_wantpacket_v6((connp), (ill), (ip6h), \ 454 (fanout_flags), (zoneid)) || ((protocol) == IPPROTO_RSVP))) 455 456 #define IPCL_CONN_HASH(src, ports, ipst) \ 457 ((unsigned)(ntohl((src)) ^ ((ports) >> 24) ^ ((ports) >> 16) ^ \ 458 ((ports) >> 8) ^ (ports)) % (ipst)->ips_ipcl_conn_fanout_size) 459 460 #define IPCL_CONN_HASH_V6(src, ports, ipst) \ 461 IPCL_CONN_HASH(V4_PART_OF_V6((src)), (ports), (ipst)) 462 463 #define IPCL_CONN_MATCH(connp, proto, src, dst, ports) \ 464 ((connp)->conn_ulp == (proto) && \ 465 (connp)->conn_ports == (ports) && \ 466 _IPCL_V4_MATCH((connp)->conn_remv6, (src)) && \ 467 _IPCL_V4_MATCH((connp)->conn_srcv6, (dst)) && \ 468 !(connp)->conn_ipv6_v6only) 469 470 #define IPCL_CONN_MATCH_V6(connp, proto, src, dst, ports) \ 471 ((connp)->conn_ulp == (proto) && \ 472 (connp)->conn_ports == (ports) && \ 473 IN6_ARE_ADDR_EQUAL(&(connp)->conn_remv6, &(src)) && \ 474 IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &(dst))) 475 476 #define IPCL_CONN_INIT(connp, protocol, src, rem, ports) { \ 477 (connp)->conn_ulp = protocol; \ 478 IN6_IPADDR_TO_V4MAPPED(src, &(connp)->conn_srcv6); \ 479 IN6_IPADDR_TO_V4MAPPED(rem, &(connp)->conn_remv6); \ 480 (connp)->conn_ports = ports; \ 481 } 482 483 #define IPCL_CONN_INIT_V6(connp, protocol, src, rem, ports) { \ 484 (connp)->conn_ulp = protocol; \ 485 (connp)->conn_srcv6 = src; \ 486 (connp)->conn_remv6 = rem; \ 487 (connp)->conn_ports = ports; \ 488 } 489 490 #define IPCL_PORT_HASH(port, size) \ 491 ((((port) >> 8) ^ (port)) & ((size) - 1)) 492 493 #define IPCL_BIND_HASH(lport, ipst) \ 494 ((unsigned)(((lport) >> 8) ^ (lport)) % \ 495 (ipst)->ips_ipcl_bind_fanout_size) 496 497 #define IPCL_BIND_MATCH(connp, proto, laddr, lport) \ 498 ((connp)->conn_ulp == (proto) && \ 499 (connp)->conn_lport == (lport) && \ 500 (_IPCL_V4_MATCH_ANY((connp)->conn_srcv6) || \ 501 _IPCL_V4_MATCH((connp)->conn_srcv6, (laddr))) && \ 502 !(connp)->conn_ipv6_v6only) 503 504 #define IPCL_BIND_MATCH_V6(connp, proto, laddr, lport) \ 505 ((connp)->conn_ulp == (proto) && \ 506 (connp)->conn_lport == (lport) && \ 507 (IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &(laddr)) || \ 508 IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_srcv6))) 509 510 #define IPCL_UDP_MATCH(connp, lport, laddr, fport, faddr) \ 511 (((connp)->conn_lport == (lport)) && \ 512 ((_IPCL_V4_MATCH_ANY((connp)->conn_srcv6) || \ 513 (_IPCL_V4_MATCH((connp)->conn_srcv6, (laddr)) && \ 514 (_IPCL_V4_MATCH_ANY((connp)->conn_remv6) || \ 515 (_IPCL_V4_MATCH((connp)->conn_remv6, (faddr)) && \ 516 (connp)->conn_fport == (fport)))))) && \ 517 !(connp)->conn_ipv6_v6only) 518 519 #define IPCL_UDP_MATCH_V6(connp, lport, laddr, fport, faddr) \ 520 (((connp)->conn_lport == (lport)) && \ 521 (IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_srcv6) || \ 522 (IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &(laddr)) && \ 523 (IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_remv6) || \ 524 (IN6_ARE_ADDR_EQUAL(&(connp)->conn_remv6, &(faddr)) && \ 525 (connp)->conn_fport == (fport)))))) 526 527 #define IPCL_TCP_EAGER_INIT(connp, protocol, src, rem, ports) { \ 528 (connp)->conn_flags |= (IPCL_TCP4|IPCL_EAGER); \ 529 IN6_IPADDR_TO_V4MAPPED(src, &(connp)->conn_srcv6); \ 530 IN6_IPADDR_TO_V4MAPPED(rem, &(connp)->conn_remv6); \ 531 (connp)->conn_ports = ports; \ 532 (connp)->conn_send = ip_output; \ 533 (connp)->conn_sqp = IP_SQUEUE_GET(lbolt); \ 534 (connp)->conn_initial_sqp = (connp)->conn_sqp; \ 535 } 536 537 #define IPCL_TCP_EAGER_INIT_V6(connp, protocol, src, rem, ports) { \ 538 (connp)->conn_flags |= (IPCL_TCP6|IPCL_EAGER|IPCL_ISV6); \ 539 (connp)->conn_srcv6 = src; \ 540 (connp)->conn_remv6 = rem; \ 541 (connp)->conn_ports = ports; \ 542 (connp)->conn_send = ip_output_v6; \ 543 (connp)->conn_sqp = IP_SQUEUE_GET(lbolt); \ 544 (connp)->conn_initial_sqp = (connp)->conn_sqp; \ 545 } 546 547 #define IPCL_UDP_HASH(lport, ipst) \ 548 IPCL_PORT_HASH(lport, (ipst)->ips_ipcl_udp_fanout_size) 549 550 #define CONN_G_HASH_SIZE 1024 551 552 /* Raw socket hash function. */ 553 #define IPCL_RAW_HASH(lport, ipst) \ 554 IPCL_PORT_HASH(lport, (ipst)->ips_ipcl_raw_fanout_size) 555 556 /* 557 * This is similar to IPCL_BIND_MATCH except that the local port check 558 * is changed to a wildcard port check. 559 */ 560 #define IPCL_RAW_MATCH(connp, proto, laddr) \ 561 ((connp)->conn_ulp == (proto) && \ 562 (connp)->conn_lport == 0 && \ 563 (_IPCL_V4_MATCH_ANY((connp)->conn_srcv6) || \ 564 _IPCL_V4_MATCH((connp)->conn_srcv6, (laddr)))) 565 566 #define IPCL_RAW_MATCH_V6(connp, proto, laddr) \ 567 ((connp)->conn_ulp == (proto) && \ 568 (connp)->conn_lport == 0 && \ 569 (IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_srcv6) || \ 570 IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &(laddr)))) 571 572 /* Function prototypes */ 573 extern void ipcl_g_init(void); 574 extern void ipcl_init(ip_stack_t *); 575 extern void ipcl_g_destroy(void); 576 extern void ipcl_destroy(ip_stack_t *); 577 extern conn_t *ipcl_conn_create(uint32_t, int, netstack_t *); 578 extern void ipcl_conn_destroy(conn_t *); 579 580 void ipcl_hash_insert_wildcard(connf_t *, conn_t *); 581 void ipcl_hash_remove(conn_t *); 582 void ipcl_hash_remove_locked(conn_t *connp, connf_t *connfp); 583 584 extern int ipcl_bind_insert(conn_t *, uint8_t, ipaddr_t, uint16_t); 585 extern int ipcl_bind_insert_v6(conn_t *, uint8_t, const in6_addr_t *, 586 uint16_t); 587 extern int ipcl_conn_insert(conn_t *, uint8_t, ipaddr_t, ipaddr_t, 588 uint32_t); 589 extern int ipcl_conn_insert_v6(conn_t *, uint8_t, const in6_addr_t *, 590 const in6_addr_t *, uint32_t, uint_t); 591 extern conn_t *ipcl_get_next_conn(connf_t *, conn_t *, uint32_t); 592 593 void ipcl_proto_insert(conn_t *, uint8_t); 594 void ipcl_proto_insert_v6(conn_t *, uint8_t); 595 conn_t *ipcl_classify_v4(mblk_t *, uint8_t, uint_t, zoneid_t, ip_stack_t *); 596 conn_t *ipcl_classify_v6(mblk_t *, uint8_t, uint_t, zoneid_t, ip_stack_t *); 597 conn_t *ipcl_classify(mblk_t *, zoneid_t, ip_stack_t *); 598 conn_t *ipcl_classify_raw(mblk_t *, uint8_t, zoneid_t, uint32_t, ipha_t *, 599 ip_stack_t *); 600 void ipcl_globalhash_insert(conn_t *); 601 void ipcl_globalhash_remove(conn_t *); 602 void ipcl_walk(pfv_t, void *, ip_stack_t *); 603 conn_t *ipcl_tcp_lookup_reversed_ipv4(ipha_t *, tcph_t *, int, ip_stack_t *); 604 conn_t *ipcl_tcp_lookup_reversed_ipv6(ip6_t *, tcpha_t *, int, uint_t, 605 ip_stack_t *); 606 conn_t *ipcl_lookup_listener_v4(uint16_t, ipaddr_t, zoneid_t, ip_stack_t *); 607 conn_t *ipcl_lookup_listener_v6(uint16_t, in6_addr_t *, uint_t, zoneid_t, 608 ip_stack_t *); 609 int conn_trace_ref(conn_t *); 610 int conn_untrace_ref(conn_t *); 611 void ipcl_conn_cleanup(conn_t *); 612 conn_t *ipcl_conn_tcp_lookup_reversed_ipv4(conn_t *, ipha_t *, tcph_t *, 613 ip_stack_t *); 614 conn_t *ipcl_conn_tcp_lookup_reversed_ipv6(conn_t *, ip6_t *, tcph_t *, 615 ip_stack_t *); 616 617 extern int ip_create_helper_stream(conn_t *connp, ldi_ident_t li); 618 extern void ip_free_helper_stream(conn_t *connp); 619 620 extern int ip_get_options(conn_t *, int, int, void *, t_uscalar_t *, cred_t *); 621 extern int ip_set_options(conn_t *, int, int, const void *, t_uscalar_t, 622 cred_t *); 623 624 #ifdef __cplusplus 625 } 626 #endif 627 628 #endif /* _INET_IPCLASSIFIER_H */ 629