xref: /titanic_51/usr/src/uts/common/inet/ip/conn_opt.c (revision 9d468d1aa2ff370e3e4b0437df3e0b065fb645ea)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2010 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 /* Copyright (c) 1990 Mentat Inc. */
27 
28 #include <sys/types.h>
29 #include <sys/stream.h>
30 #include <sys/strsun.h>
31 #define	_SUN_TPI_VERSION 2
32 #include <sys/tihdr.h>
33 #include <sys/xti_inet.h>
34 #include <sys/ucred.h>
35 #include <sys/zone.h>
36 #include <sys/ddi.h>
37 #include <sys/sunddi.h>
38 #include <sys/cmn_err.h>
39 #include <sys/debug.h>
40 #include <sys/atomic.h>
41 #include <sys/policy.h>
42 
43 #include <sys/systm.h>
44 #include <sys/param.h>
45 #include <sys/kmem.h>
46 #include <sys/sdt.h>
47 #include <sys/socket.h>
48 #include <sys/ethernet.h>
49 #include <sys/mac.h>
50 #include <net/if.h>
51 #include <net/if_types.h>
52 #include <net/if_arp.h>
53 #include <net/route.h>
54 #include <sys/sockio.h>
55 #include <netinet/in.h>
56 #include <net/if_dl.h>
57 
58 #include <inet/common.h>
59 #include <inet/mi.h>
60 #include <inet/mib2.h>
61 #include <inet/nd.h>
62 #include <inet/arp.h>
63 #include <inet/snmpcom.h>
64 #include <inet/kstatcom.h>
65 
66 #include <netinet/igmp_var.h>
67 #include <netinet/ip6.h>
68 #include <netinet/icmp6.h>
69 #include <netinet/sctp.h>
70 
71 #include <inet/ip.h>
72 #include <inet/ip_impl.h>
73 #include <inet/ip6.h>
74 #include <inet/ip6_asp.h>
75 #include <inet/tcp.h>
76 #include <inet/ip_multi.h>
77 #include <inet/ip_if.h>
78 #include <inet/ip_ire.h>
79 #include <inet/ip_ftable.h>
80 #include <inet/ip_rts.h>
81 #include <inet/optcom.h>
82 #include <inet/ip_ndp.h>
83 #include <inet/ip_listutils.h>
84 #include <netinet/igmp.h>
85 #include <netinet/ip_mroute.h>
86 #include <netinet/udp.h>
87 #include <inet/ipp_common.h>
88 
89 #include <net/pfkeyv2.h>
90 #include <inet/sadb.h>
91 #include <inet/ipsec_impl.h>
92 #include <inet/ipdrop.h>
93 #include <inet/ip_netinfo.h>
94 
95 #include <inet/ipclassifier.h>
96 #include <inet/sctp_ip.h>
97 #include <inet/sctp/sctp_impl.h>
98 #include <inet/udp_impl.h>
99 #include <sys/sunddi.h>
100 
101 #include <sys/tsol/label.h>
102 #include <sys/tsol/tnet.h>
103 
104 /*
105  * Return how much size is needed for the different ancillary data items
106  */
107 uint_t
108 conn_recvancillary_size(conn_t *connp, crb_t recv_ancillary,
109     ip_recv_attr_t *ira, mblk_t *mp, ip_pkt_t *ipp)
110 {
111 	uint_t		ancil_size;
112 	ip_stack_t	*ipst = connp->conn_netstack->netstack_ip;
113 
114 	/*
115 	 * If IP_RECVDSTADDR is set we include the destination IP
116 	 * address as an option. With IP_RECVOPTS we include all
117 	 * the IP options.
118 	 */
119 	ancil_size = 0;
120 	if (recv_ancillary.crb_recvdstaddr &&
121 	    (ira->ira_flags & IRAF_IS_IPV4)) {
122 		ancil_size += sizeof (struct T_opthdr) +
123 		    sizeof (struct in_addr);
124 		IP_STAT(ipst, conn_in_recvdstaddr);
125 	}
126 
127 	/*
128 	 * ip_recvpktinfo is used for both AF_INET and AF_INET6 but
129 	 * are different
130 	 */
131 	if (recv_ancillary.crb_ip_recvpktinfo &&
132 	    connp->conn_family == AF_INET) {
133 		ancil_size += sizeof (struct T_opthdr) +
134 		    sizeof (struct in_pktinfo);
135 		IP_STAT(ipst, conn_in_recvpktinfo);
136 	}
137 
138 	if ((recv_ancillary.crb_recvopts) &&
139 	    (ipp->ipp_fields & IPPF_IPV4_OPTIONS)) {
140 		ancil_size += sizeof (struct T_opthdr) +
141 		    ipp->ipp_ipv4_options_len;
142 		IP_STAT(ipst, conn_in_recvopts);
143 	}
144 
145 	if (recv_ancillary.crb_recvslla) {
146 		ip_stack_t *ipst = connp->conn_netstack->netstack_ip;
147 		ill_t *ill;
148 
149 		/* Make sure ira_l2src is setup if not already */
150 		if (!(ira->ira_flags & IRAF_L2SRC_SET)) {
151 			ill = ill_lookup_on_ifindex(ira->ira_rifindex, B_FALSE,
152 			    ipst);
153 			if (ill != NULL) {
154 				ip_setl2src(mp, ira, ill);
155 				ill_refrele(ill);
156 			}
157 		}
158 		ancil_size += sizeof (struct T_opthdr) +
159 		    sizeof (struct sockaddr_dl);
160 		IP_STAT(ipst, conn_in_recvslla);
161 	}
162 
163 	if (recv_ancillary.crb_recvif) {
164 		ancil_size += sizeof (struct T_opthdr) + sizeof (uint_t);
165 		IP_STAT(ipst, conn_in_recvif);
166 	}
167 
168 	/*
169 	 * ip_recvpktinfo is used for both AF_INET and AF_INET6 but
170 	 * are different
171 	 */
172 	if (recv_ancillary.crb_ip_recvpktinfo &&
173 	    connp->conn_family == AF_INET6) {
174 		ancil_size += sizeof (struct T_opthdr) +
175 		    sizeof (struct in6_pktinfo);
176 		IP_STAT(ipst, conn_in_recvpktinfo);
177 	}
178 
179 	if (recv_ancillary.crb_ipv6_recvhoplimit) {
180 		ancil_size += sizeof (struct T_opthdr) + sizeof (int);
181 		IP_STAT(ipst, conn_in_recvhoplimit);
182 	}
183 
184 	if (recv_ancillary.crb_ipv6_recvtclass) {
185 		ancil_size += sizeof (struct T_opthdr) + sizeof (int);
186 		IP_STAT(ipst, conn_in_recvtclass);
187 	}
188 
189 	if (recv_ancillary.crb_ipv6_recvhopopts &&
190 	    (ipp->ipp_fields & IPPF_HOPOPTS)) {
191 		ancil_size += sizeof (struct T_opthdr) + ipp->ipp_hopoptslen;
192 		IP_STAT(ipst, conn_in_recvhopopts);
193 	}
194 	/*
195 	 * To honor RFC3542 when an application asks for both IPV6_RECVDSTOPTS
196 	 * and IPV6_RECVRTHDR, we pass up the item rthdrdstopts (the destination
197 	 * options that appear before a routing header.
198 	 * We also pass them up if IPV6_RECVRTHDRDSTOPTS is set.
199 	 */
200 	if (ipp->ipp_fields & IPPF_RTHDRDSTOPTS) {
201 		if (recv_ancillary.crb_ipv6_recvrthdrdstopts ||
202 		    (recv_ancillary.crb_ipv6_recvdstopts &&
203 		    recv_ancillary.crb_ipv6_recvrthdr)) {
204 			ancil_size += sizeof (struct T_opthdr) +
205 			    ipp->ipp_rthdrdstoptslen;
206 			IP_STAT(ipst, conn_in_recvrthdrdstopts);
207 		}
208 	}
209 	if ((recv_ancillary.crb_ipv6_recvrthdr) &&
210 	    (ipp->ipp_fields & IPPF_RTHDR)) {
211 		ancil_size += sizeof (struct T_opthdr) + ipp->ipp_rthdrlen;
212 		IP_STAT(ipst, conn_in_recvrthdr);
213 	}
214 	if ((recv_ancillary.crb_ipv6_recvdstopts ||
215 	    recv_ancillary.crb_old_ipv6_recvdstopts) &&
216 	    (ipp->ipp_fields & IPPF_DSTOPTS)) {
217 		ancil_size += sizeof (struct T_opthdr) + ipp->ipp_dstoptslen;
218 		IP_STAT(ipst, conn_in_recvdstopts);
219 	}
220 	if (recv_ancillary.crb_recvucred && ira->ira_cred != NULL) {
221 		ancil_size += sizeof (struct T_opthdr) +
222 		    ucredminsize(ira->ira_cred);
223 		IP_STAT(ipst, conn_in_recvucred);
224 	}
225 
226 	/*
227 	 * If SO_TIMESTAMP is set allocate the appropriate sized
228 	 * buffer. Since gethrestime() expects a pointer aligned
229 	 * argument, we allocate space necessary for extra
230 	 * alignment (even though it might not be used).
231 	 */
232 	if (recv_ancillary.crb_timestamp) {
233 		ancil_size += sizeof (struct T_opthdr) +
234 		    sizeof (timestruc_t) + _POINTER_ALIGNMENT;
235 		IP_STAT(ipst, conn_in_timestamp);
236 	}
237 
238 	/*
239 	 * If IP_RECVTTL is set allocate the appropriate sized buffer
240 	 */
241 	if (recv_ancillary.crb_recvttl &&
242 	    (ira->ira_flags & IRAF_IS_IPV4)) {
243 		ancil_size += sizeof (struct T_opthdr) + sizeof (uint8_t);
244 		IP_STAT(ipst, conn_in_recvttl);
245 	}
246 
247 	return (ancil_size);
248 }
249 
250 /*
251  * Lay down the ancillary data items at "ancil_buf".
252  * Assumes caller has used conn_recvancillary_size to allocate a sufficiently
253  * large buffer - ancil_size.
254  */
255 void
256 conn_recvancillary_add(conn_t *connp, crb_t recv_ancillary,
257     ip_recv_attr_t *ira, ip_pkt_t *ipp, uchar_t *ancil_buf, uint_t ancil_size)
258 {
259 	/*
260 	 * Copy in destination address before options to avoid
261 	 * any padding issues.
262 	 */
263 	if (recv_ancillary.crb_recvdstaddr &&
264 	    (ira->ira_flags & IRAF_IS_IPV4)) {
265 		struct T_opthdr *toh;
266 		ipaddr_t *dstptr;
267 
268 		toh = (struct T_opthdr *)ancil_buf;
269 		toh->level = IPPROTO_IP;
270 		toh->name = IP_RECVDSTADDR;
271 		toh->len = sizeof (struct T_opthdr) + sizeof (ipaddr_t);
272 		toh->status = 0;
273 		ancil_buf += sizeof (struct T_opthdr);
274 		dstptr = (ipaddr_t *)ancil_buf;
275 		*dstptr = ipp->ipp_addr_v4;
276 		ancil_buf += sizeof (ipaddr_t);
277 		ancil_size -= toh->len;
278 	}
279 
280 	/*
281 	 * ip_recvpktinfo is used for both AF_INET and AF_INET6 but
282 	 * are different
283 	 */
284 	if (recv_ancillary.crb_ip_recvpktinfo &&
285 	    connp->conn_family == AF_INET) {
286 		ip_stack_t *ipst = connp->conn_netstack->netstack_ip;
287 		struct T_opthdr *toh;
288 		struct in_pktinfo *pktinfop;
289 		ill_t *ill;
290 		ipif_t *ipif;
291 
292 		toh = (struct T_opthdr *)ancil_buf;
293 		toh->level = IPPROTO_IP;
294 		toh->name = IP_PKTINFO;
295 		toh->len = sizeof (struct T_opthdr) + sizeof (*pktinfop);
296 		toh->status = 0;
297 		ancil_buf += sizeof (struct T_opthdr);
298 		pktinfop = (struct in_pktinfo *)ancil_buf;
299 
300 		pktinfop->ipi_ifindex = ira->ira_ruifindex;
301 		pktinfop->ipi_spec_dst.s_addr = INADDR_ANY;
302 
303 		/* Find a good address to report */
304 		ill = ill_lookup_on_ifindex(ira->ira_ruifindex, B_FALSE, ipst);
305 		if (ill != NULL) {
306 			ipif = ipif_good_addr(ill, IPCL_ZONEID(connp));
307 			if (ipif != NULL) {
308 				pktinfop->ipi_spec_dst.s_addr =
309 				    ipif->ipif_lcl_addr;
310 				ipif_refrele(ipif);
311 			}
312 			ill_refrele(ill);
313 		}
314 		pktinfop->ipi_addr.s_addr = ipp->ipp_addr_v4;
315 		ancil_buf += sizeof (struct in_pktinfo);
316 		ancil_size -= toh->len;
317 	}
318 
319 	if ((recv_ancillary.crb_recvopts) &&
320 	    (ipp->ipp_fields & IPPF_IPV4_OPTIONS)) {
321 		struct T_opthdr *toh;
322 
323 		toh = (struct T_opthdr *)ancil_buf;
324 		toh->level = IPPROTO_IP;
325 		toh->name = IP_RECVOPTS;
326 		toh->len = sizeof (struct T_opthdr) + ipp->ipp_ipv4_options_len;
327 		toh->status = 0;
328 		ancil_buf += sizeof (struct T_opthdr);
329 		bcopy(ipp->ipp_ipv4_options, ancil_buf,
330 		    ipp->ipp_ipv4_options_len);
331 		ancil_buf += ipp->ipp_ipv4_options_len;
332 		ancil_size -= toh->len;
333 	}
334 
335 	if (recv_ancillary.crb_recvslla) {
336 		ip_stack_t *ipst = connp->conn_netstack->netstack_ip;
337 		struct T_opthdr *toh;
338 		struct sockaddr_dl *dstptr;
339 		ill_t *ill;
340 		int alen = 0;
341 
342 		ill = ill_lookup_on_ifindex(ira->ira_rifindex, B_FALSE, ipst);
343 		if (ill != NULL)
344 			alen = ill->ill_phys_addr_length;
345 
346 		/*
347 		 * For loopback multicast and broadcast the packet arrives
348 		 * with ira_ruifdex being the physical interface, but
349 		 * ira_l2src is all zero since ip_postfrag_loopback doesn't
350 		 * know our l2src. We don't report the address in that case.
351 		 */
352 		if (ira->ira_flags & IRAF_LOOPBACK)
353 			alen = 0;
354 
355 		toh = (struct T_opthdr *)ancil_buf;
356 		toh->level = IPPROTO_IP;
357 		toh->name = IP_RECVSLLA;
358 		toh->len = sizeof (struct T_opthdr) +
359 		    sizeof (struct sockaddr_dl);
360 		toh->status = 0;
361 		ancil_buf += sizeof (struct T_opthdr);
362 		dstptr = (struct sockaddr_dl *)ancil_buf;
363 		dstptr->sdl_family = AF_LINK;
364 		dstptr->sdl_index = ira->ira_ruifindex;
365 		if (ill != NULL)
366 			dstptr->sdl_type = ill->ill_type;
367 		else
368 			dstptr->sdl_type = 0;
369 		dstptr->sdl_nlen = 0;
370 		dstptr->sdl_alen = alen;
371 		dstptr->sdl_slen = 0;
372 		bcopy(ira->ira_l2src, dstptr->sdl_data, alen);
373 		ancil_buf += sizeof (struct sockaddr_dl);
374 		ancil_size -= toh->len;
375 		if (ill != NULL)
376 			ill_refrele(ill);
377 	}
378 
379 	if (recv_ancillary.crb_recvif) {
380 		struct T_opthdr *toh;
381 		uint_t		*dstptr;
382 
383 		toh = (struct T_opthdr *)ancil_buf;
384 		toh->level = IPPROTO_IP;
385 		toh->name = IP_RECVIF;
386 		toh->len = sizeof (struct T_opthdr) + sizeof (uint_t);
387 		toh->status = 0;
388 		ancil_buf += sizeof (struct T_opthdr);
389 		dstptr = (uint_t *)ancil_buf;
390 		*dstptr = ira->ira_ruifindex;
391 		ancil_buf += sizeof (uint_t);
392 		ancil_size -= toh->len;
393 	}
394 
395 	/*
396 	 * ip_recvpktinfo is used for both AF_INET and AF_INET6 but
397 	 * are different
398 	 */
399 	if (recv_ancillary.crb_ip_recvpktinfo &&
400 	    connp->conn_family == AF_INET6) {
401 		struct T_opthdr *toh;
402 		struct in6_pktinfo *pkti;
403 
404 		toh = (struct T_opthdr *)ancil_buf;
405 		toh->level = IPPROTO_IPV6;
406 		toh->name = IPV6_PKTINFO;
407 		toh->len = sizeof (struct T_opthdr) + sizeof (*pkti);
408 		toh->status = 0;
409 		ancil_buf += sizeof (struct T_opthdr);
410 		pkti = (struct in6_pktinfo *)ancil_buf;
411 		if (ira->ira_flags & IRAF_IS_IPV4) {
412 			IN6_IPADDR_TO_V4MAPPED(ipp->ipp_addr_v4,
413 			    &pkti->ipi6_addr);
414 		} else {
415 			pkti->ipi6_addr = ipp->ipp_addr;
416 		}
417 		pkti->ipi6_ifindex = ira->ira_ruifindex;
418 
419 		ancil_buf += sizeof (*pkti);
420 		ancil_size -= toh->len;
421 	}
422 	if (recv_ancillary.crb_ipv6_recvhoplimit) {
423 		struct T_opthdr *toh;
424 
425 		toh = (struct T_opthdr *)ancil_buf;
426 		toh->level = IPPROTO_IPV6;
427 		toh->name = IPV6_HOPLIMIT;
428 		toh->len = sizeof (struct T_opthdr) + sizeof (uint_t);
429 		toh->status = 0;
430 		ancil_buf += sizeof (struct T_opthdr);
431 		*(uint_t *)ancil_buf = ipp->ipp_hoplimit;
432 		ancil_buf += sizeof (uint_t);
433 		ancil_size -= toh->len;
434 	}
435 	if (recv_ancillary.crb_ipv6_recvtclass) {
436 		struct T_opthdr *toh;
437 
438 		toh = (struct T_opthdr *)ancil_buf;
439 		toh->level = IPPROTO_IPV6;
440 		toh->name = IPV6_TCLASS;
441 		toh->len = sizeof (struct T_opthdr) + sizeof (uint_t);
442 		toh->status = 0;
443 		ancil_buf += sizeof (struct T_opthdr);
444 
445 		if (ira->ira_flags & IRAF_IS_IPV4)
446 			*(uint_t *)ancil_buf = ipp->ipp_type_of_service;
447 		else
448 			*(uint_t *)ancil_buf = ipp->ipp_tclass;
449 		ancil_buf += sizeof (uint_t);
450 		ancil_size -= toh->len;
451 	}
452 	if (recv_ancillary.crb_ipv6_recvhopopts &&
453 	    (ipp->ipp_fields & IPPF_HOPOPTS)) {
454 		struct T_opthdr *toh;
455 
456 		toh = (struct T_opthdr *)ancil_buf;
457 		toh->level = IPPROTO_IPV6;
458 		toh->name = IPV6_HOPOPTS;
459 		toh->len = sizeof (struct T_opthdr) + ipp->ipp_hopoptslen;
460 		toh->status = 0;
461 		ancil_buf += sizeof (struct T_opthdr);
462 		bcopy(ipp->ipp_hopopts, ancil_buf, ipp->ipp_hopoptslen);
463 		ancil_buf += ipp->ipp_hopoptslen;
464 		ancil_size -= toh->len;
465 	}
466 	/*
467 	 * To honor RFC3542 when an application asks for both IPV6_RECVDSTOPTS
468 	 * and IPV6_RECVRTHDR, we pass up the item rthdrdstopts (the destination
469 	 * options that appear before a routing header.
470 	 * We also pass them up if IPV6_RECVRTHDRDSTOPTS is set.
471 	 */
472 	if (ipp->ipp_fields & IPPF_RTHDRDSTOPTS) {
473 		if (recv_ancillary.crb_ipv6_recvrthdrdstopts ||
474 		    (recv_ancillary.crb_ipv6_recvdstopts &&
475 		    recv_ancillary.crb_ipv6_recvrthdr)) {
476 			struct T_opthdr *toh;
477 
478 			toh = (struct T_opthdr *)ancil_buf;
479 			toh->level = IPPROTO_IPV6;
480 			toh->name = IPV6_DSTOPTS;
481 			toh->len = sizeof (struct T_opthdr) +
482 			    ipp->ipp_rthdrdstoptslen;
483 			toh->status = 0;
484 			ancil_buf += sizeof (struct T_opthdr);
485 			bcopy(ipp->ipp_rthdrdstopts, ancil_buf,
486 			    ipp->ipp_rthdrdstoptslen);
487 			ancil_buf += ipp->ipp_rthdrdstoptslen;
488 			ancil_size -= toh->len;
489 		}
490 	}
491 	if (recv_ancillary.crb_ipv6_recvrthdr &&
492 	    (ipp->ipp_fields & IPPF_RTHDR)) {
493 		struct T_opthdr *toh;
494 
495 		toh = (struct T_opthdr *)ancil_buf;
496 		toh->level = IPPROTO_IPV6;
497 		toh->name = IPV6_RTHDR;
498 		toh->len = sizeof (struct T_opthdr) + ipp->ipp_rthdrlen;
499 		toh->status = 0;
500 		ancil_buf += sizeof (struct T_opthdr);
501 		bcopy(ipp->ipp_rthdr, ancil_buf, ipp->ipp_rthdrlen);
502 		ancil_buf += ipp->ipp_rthdrlen;
503 		ancil_size -= toh->len;
504 	}
505 	if ((recv_ancillary.crb_ipv6_recvdstopts ||
506 	    recv_ancillary.crb_old_ipv6_recvdstopts) &&
507 	    (ipp->ipp_fields & IPPF_DSTOPTS)) {
508 		struct T_opthdr *toh;
509 
510 		toh = (struct T_opthdr *)ancil_buf;
511 		toh->level = IPPROTO_IPV6;
512 		toh->name = IPV6_DSTOPTS;
513 		toh->len = sizeof (struct T_opthdr) + ipp->ipp_dstoptslen;
514 		toh->status = 0;
515 		ancil_buf += sizeof (struct T_opthdr);
516 		bcopy(ipp->ipp_dstopts, ancil_buf, ipp->ipp_dstoptslen);
517 		ancil_buf += ipp->ipp_dstoptslen;
518 		ancil_size -= toh->len;
519 	}
520 
521 	if (recv_ancillary.crb_recvucred && ira->ira_cred != NULL) {
522 		struct T_opthdr *toh;
523 		cred_t		*rcr = connp->conn_cred;
524 
525 		toh = (struct T_opthdr *)ancil_buf;
526 		toh->level = SOL_SOCKET;
527 		toh->name = SCM_UCRED;
528 		toh->len = sizeof (struct T_opthdr) +
529 		    ucredminsize(ira->ira_cred);
530 		toh->status = 0;
531 		(void) cred2ucred(ira->ira_cred, ira->ira_cpid, &toh[1], rcr);
532 		ancil_buf += toh->len;
533 		ancil_size -= toh->len;
534 	}
535 	if (recv_ancillary.crb_timestamp) {
536 		struct	T_opthdr *toh;
537 
538 		toh = (struct T_opthdr *)ancil_buf;
539 		toh->level = SOL_SOCKET;
540 		toh->name = SCM_TIMESTAMP;
541 		toh->len = sizeof (struct T_opthdr) +
542 		    sizeof (timestruc_t) + _POINTER_ALIGNMENT;
543 		toh->status = 0;
544 		ancil_buf += sizeof (struct T_opthdr);
545 		/* Align for gethrestime() */
546 		ancil_buf = (uchar_t *)P2ROUNDUP((intptr_t)ancil_buf,
547 		    sizeof (intptr_t));
548 		gethrestime((timestruc_t *)ancil_buf);
549 		ancil_buf = (uchar_t *)toh + toh->len;
550 		ancil_size -= toh->len;
551 	}
552 
553 	/*
554 	 * CAUTION:
555 	 * Due to aligment issues
556 	 * Processing of IP_RECVTTL option
557 	 * should always be the last. Adding
558 	 * any option processing after this will
559 	 * cause alignment panic.
560 	 */
561 	if (recv_ancillary.crb_recvttl &&
562 	    (ira->ira_flags & IRAF_IS_IPV4)) {
563 		struct	T_opthdr *toh;
564 		uint8_t	*dstptr;
565 
566 		toh = (struct T_opthdr *)ancil_buf;
567 		toh->level = IPPROTO_IP;
568 		toh->name = IP_RECVTTL;
569 		toh->len = sizeof (struct T_opthdr) + sizeof (uint8_t);
570 		toh->status = 0;
571 		ancil_buf += sizeof (struct T_opthdr);
572 		dstptr = (uint8_t *)ancil_buf;
573 		*dstptr = ipp->ipp_hoplimit;
574 		ancil_buf += sizeof (uint8_t);
575 		ancil_size -= toh->len;
576 	}
577 
578 	/* Consumed all of allocated space */
579 	ASSERT(ancil_size == 0);
580 
581 }
582 
583 /*
584  * This routine retrieves the current status of socket options.
585  * It returns the size of the option retrieved, or -1.
586  */
587 int
588 conn_opt_get(conn_opt_arg_t *coa, t_scalar_t level, t_scalar_t name,
589     uchar_t *ptr)
590 {
591 	int		*i1 = (int *)ptr;
592 	conn_t		*connp = coa->coa_connp;
593 	ip_xmit_attr_t	*ixa = coa->coa_ixa;
594 	ip_pkt_t	*ipp = coa->coa_ipp;
595 	ip_stack_t	*ipst = ixa->ixa_ipst;
596 	uint_t		len;
597 
598 	ASSERT(MUTEX_HELD(&coa->coa_connp->conn_lock));
599 
600 	switch (level) {
601 	case SOL_SOCKET:
602 		switch (name) {
603 		case SO_DEBUG:
604 			*i1 = connp->conn_debug ? SO_DEBUG : 0;
605 			break;	/* goto sizeof (int) option return */
606 		case SO_KEEPALIVE:
607 			*i1 = connp->conn_keepalive ? SO_KEEPALIVE : 0;
608 			break;
609 		case SO_LINGER:	{
610 			struct linger *lgr = (struct linger *)ptr;
611 
612 			lgr->l_onoff = connp->conn_linger ? SO_LINGER : 0;
613 			lgr->l_linger = connp->conn_lingertime;
614 			}
615 			return (sizeof (struct linger));
616 
617 		case SO_OOBINLINE:
618 			*i1 = connp->conn_oobinline ? SO_OOBINLINE : 0;
619 			break;
620 		case SO_REUSEADDR:
621 			*i1 = connp->conn_reuseaddr ? SO_REUSEADDR : 0;
622 			break;	/* goto sizeof (int) option return */
623 		case SO_TYPE:
624 			*i1 = connp->conn_so_type;
625 			break;	/* goto sizeof (int) option return */
626 		case SO_DONTROUTE:
627 			*i1 = (ixa->ixa_flags & IXAF_DONTROUTE) ?
628 			    SO_DONTROUTE : 0;
629 			break;	/* goto sizeof (int) option return */
630 		case SO_USELOOPBACK:
631 			*i1 = connp->conn_useloopback ? SO_USELOOPBACK : 0;
632 			break;	/* goto sizeof (int) option return */
633 		case SO_BROADCAST:
634 			*i1 = connp->conn_broadcast ? SO_BROADCAST : 0;
635 			break;	/* goto sizeof (int) option return */
636 
637 		case SO_SNDBUF:
638 			*i1 = connp->conn_sndbuf;
639 			break;	/* goto sizeof (int) option return */
640 		case SO_RCVBUF:
641 			*i1 = connp->conn_rcvbuf;
642 			break;	/* goto sizeof (int) option return */
643 		case SO_RCVTIMEO:
644 		case SO_SNDTIMEO:
645 			/*
646 			 * Pass these two options in order for third part
647 			 * protocol usage. Here just return directly.
648 			 */
649 			*i1 = 0;
650 			break;
651 		case SO_DGRAM_ERRIND:
652 			*i1 = connp->conn_dgram_errind ? SO_DGRAM_ERRIND : 0;
653 			break;	/* goto sizeof (int) option return */
654 		case SO_RECVUCRED:
655 			*i1 = connp->conn_recv_ancillary.crb_recvucred;
656 			break;	/* goto sizeof (int) option return */
657 		case SO_TIMESTAMP:
658 			*i1 = connp->conn_recv_ancillary.crb_timestamp;
659 			break;	/* goto sizeof (int) option return */
660 		case SO_VRRP:
661 			*i1 = connp->conn_isvrrp;
662 			break;	/* goto sizeof (int) option return */
663 		case SO_ANON_MLP:
664 			*i1 = connp->conn_anon_mlp;
665 			break;	/* goto sizeof (int) option return */
666 		case SO_MAC_EXEMPT:
667 			*i1 = (connp->conn_mac_mode == CONN_MAC_AWARE);
668 			break;	/* goto sizeof (int) option return */
669 		case SO_MAC_IMPLICIT:
670 			*i1 = (connp->conn_mac_mode == CONN_MAC_IMPLICIT);
671 			break;	/* goto sizeof (int) option return */
672 		case SO_ALLZONES:
673 			*i1 = connp->conn_allzones;
674 			break;	/* goto sizeof (int) option return */
675 		case SO_EXCLBIND:
676 			*i1 = connp->conn_exclbind ? SO_EXCLBIND : 0;
677 			break;
678 		case SO_PROTOTYPE:
679 			*i1 = connp->conn_proto;
680 			break;
681 
682 		case SO_DOMAIN:
683 			*i1 = connp->conn_family;
684 			break;
685 		default:
686 			return (-1);
687 		}
688 		break;
689 	case IPPROTO_IP:
690 		if (connp->conn_family != AF_INET)
691 			return (-1);
692 		switch (name) {
693 		case IP_OPTIONS:
694 		case T_IP_OPTIONS:
695 			if (!(ipp->ipp_fields & IPPF_IPV4_OPTIONS))
696 				return (0);
697 
698 			len = ipp->ipp_ipv4_options_len;
699 			if (len > 0) {
700 				bcopy(ipp->ipp_ipv4_options, ptr, len);
701 			}
702 			return (len);
703 
704 		case IP_PKTINFO: {
705 			/*
706 			 * This also handles IP_RECVPKTINFO.
707 			 * IP_PKTINFO and IP_RECVPKTINFO have same value.
708 			 * Differentiation is based on the size of the
709 			 * argument passed in.
710 			 */
711 			struct in_pktinfo *pktinfo;
712 
713 #ifdef notdef
714 			/* optcom doesn't provide a length with "get" */
715 			if (inlen == sizeof (int)) {
716 				/* This is IP_RECVPKTINFO option. */
717 				*i1 = connp->conn_recv_ancillary.
718 				    crb_ip_recvpktinfo;
719 				return (sizeof (int));
720 			}
721 #endif
722 			/* XXX assumes that caller has room for max size! */
723 
724 			pktinfo = (struct in_pktinfo *)ptr;
725 			pktinfo->ipi_ifindex = ixa->ixa_ifindex;
726 			if (ipp->ipp_fields & IPPF_ADDR)
727 				pktinfo->ipi_spec_dst.s_addr = ipp->ipp_addr_v4;
728 			else
729 				pktinfo->ipi_spec_dst.s_addr = INADDR_ANY;
730 			return (sizeof (struct in_pktinfo));
731 		}
732 		case IP_DONTFRAG:
733 			*i1 = (ixa->ixa_flags & IXAF_DONTFRAG) != 0;
734 			return (sizeof (int));
735 		case IP_TOS:
736 		case T_IP_TOS:
737 			*i1 = (int)ipp->ipp_type_of_service;
738 			break;	/* goto sizeof (int) option return */
739 		case IP_TTL:
740 			*i1 = (int)ipp->ipp_unicast_hops;
741 			break;	/* goto sizeof (int) option return */
742 		case IP_DHCPINIT_IF:
743 			return (-1);
744 		case IP_NEXTHOP:
745 			if (ixa->ixa_flags & IXAF_NEXTHOP_SET) {
746 				*(ipaddr_t *)ptr = ixa->ixa_nexthop_v4;
747 				return (sizeof (ipaddr_t));
748 			} else {
749 				return (0);
750 			}
751 
752 		case IP_MULTICAST_IF:
753 			/* 0 address if not set */
754 			*(ipaddr_t *)ptr = ixa->ixa_multicast_ifaddr;
755 			return (sizeof (ipaddr_t));
756 		case IP_MULTICAST_TTL:
757 			*(uchar_t *)ptr = ixa->ixa_multicast_ttl;
758 			return (sizeof (uchar_t));
759 		case IP_MULTICAST_LOOP:
760 			*ptr = (ixa->ixa_flags & IXAF_MULTICAST_LOOP) ? 1 : 0;
761 			return (sizeof (uint8_t));
762 		case IP_RECVOPTS:
763 			*i1 = connp->conn_recv_ancillary.crb_recvopts;
764 			break;	/* goto sizeof (int) option return */
765 		case IP_RECVDSTADDR:
766 			*i1 = connp->conn_recv_ancillary.crb_recvdstaddr;
767 			break;	/* goto sizeof (int) option return */
768 		case IP_RECVIF:
769 			*i1 = connp->conn_recv_ancillary.crb_recvif;
770 			break;	/* goto sizeof (int) option return */
771 		case IP_RECVSLLA:
772 			*i1 = connp->conn_recv_ancillary.crb_recvslla;
773 			break;	/* goto sizeof (int) option return */
774 		case IP_RECVTTL:
775 			*i1 = connp->conn_recv_ancillary.crb_recvttl;
776 			break;	/* goto sizeof (int) option return */
777 		case IP_ADD_MEMBERSHIP:
778 		case IP_DROP_MEMBERSHIP:
779 		case MCAST_JOIN_GROUP:
780 		case MCAST_LEAVE_GROUP:
781 		case IP_BLOCK_SOURCE:
782 		case IP_UNBLOCK_SOURCE:
783 		case IP_ADD_SOURCE_MEMBERSHIP:
784 		case IP_DROP_SOURCE_MEMBERSHIP:
785 		case MCAST_BLOCK_SOURCE:
786 		case MCAST_UNBLOCK_SOURCE:
787 		case MCAST_JOIN_SOURCE_GROUP:
788 		case MCAST_LEAVE_SOURCE_GROUP:
789 		case MRT_INIT:
790 		case MRT_DONE:
791 		case MRT_ADD_VIF:
792 		case MRT_DEL_VIF:
793 		case MRT_ADD_MFC:
794 		case MRT_DEL_MFC:
795 			/* cannot "get" the value for these */
796 			return (-1);
797 		case MRT_VERSION:
798 		case MRT_ASSERT:
799 			(void) ip_mrouter_get(name, connp, ptr);
800 			return (sizeof (int));
801 		case IP_SEC_OPT:
802 			return (ipsec_req_from_conn(connp, (ipsec_req_t	*)ptr,
803 			    IPSEC_AF_V4));
804 		case IP_BOUND_IF:
805 			/* Zero if not set */
806 			*i1 = connp->conn_bound_if;
807 			break;	/* goto sizeof (int) option return */
808 		case IP_UNSPEC_SRC:
809 			*i1 = connp->conn_unspec_src;
810 			break;	/* goto sizeof (int) option return */
811 		case IP_BROADCAST_TTL:
812 			if (ixa->ixa_flags & IXAF_BROADCAST_TTL_SET)
813 				*(uchar_t *)ptr = ixa->ixa_broadcast_ttl;
814 			else
815 				*(uchar_t *)ptr = ipst->ips_ip_broadcast_ttl;
816 			return (sizeof (uchar_t));
817 		default:
818 			return (-1);
819 		}
820 		break;
821 	case IPPROTO_IPV6:
822 		if (connp->conn_family != AF_INET6)
823 			return (-1);
824 		switch (name) {
825 		case IPV6_UNICAST_HOPS:
826 			*i1 = (int)ipp->ipp_unicast_hops;
827 			break;	/* goto sizeof (int) option return */
828 		case IPV6_MULTICAST_IF:
829 			/* 0 index if not set */
830 			*i1 = ixa->ixa_multicast_ifindex;
831 			break;	/* goto sizeof (int) option return */
832 		case IPV6_MULTICAST_HOPS:
833 			*i1 = ixa->ixa_multicast_ttl;
834 			break;	/* goto sizeof (int) option return */
835 		case IPV6_MULTICAST_LOOP:
836 			*i1 = (ixa->ixa_flags & IXAF_MULTICAST_LOOP) ? 1 : 0;
837 			break;	/* goto sizeof (int) option return */
838 		case IPV6_JOIN_GROUP:
839 		case IPV6_LEAVE_GROUP:
840 		case MCAST_JOIN_GROUP:
841 		case MCAST_LEAVE_GROUP:
842 		case MCAST_BLOCK_SOURCE:
843 		case MCAST_UNBLOCK_SOURCE:
844 		case MCAST_JOIN_SOURCE_GROUP:
845 		case MCAST_LEAVE_SOURCE_GROUP:
846 			/* cannot "get" the value for these */
847 			return (-1);
848 		case IPV6_BOUND_IF:
849 			/* Zero if not set */
850 			*i1 = connp->conn_bound_if;
851 			break;	/* goto sizeof (int) option return */
852 		case IPV6_UNSPEC_SRC:
853 			*i1 = connp->conn_unspec_src;
854 			break;	/* goto sizeof (int) option return */
855 		case IPV6_RECVPKTINFO:
856 			*i1 = connp->conn_recv_ancillary.crb_ip_recvpktinfo;
857 			break;	/* goto sizeof (int) option return */
858 		case IPV6_RECVTCLASS:
859 			*i1 = connp->conn_recv_ancillary.crb_ipv6_recvtclass;
860 			break;	/* goto sizeof (int) option return */
861 		case IPV6_RECVPATHMTU:
862 			*i1 = connp->conn_ipv6_recvpathmtu;
863 			break;	/* goto sizeof (int) option return */
864 		case IPV6_RECVHOPLIMIT:
865 			*i1 = connp->conn_recv_ancillary.crb_ipv6_recvhoplimit;
866 			break;	/* goto sizeof (int) option return */
867 		case IPV6_RECVHOPOPTS:
868 			*i1 = connp->conn_recv_ancillary.crb_ipv6_recvhopopts;
869 			break;	/* goto sizeof (int) option return */
870 		case IPV6_RECVDSTOPTS:
871 			*i1 = connp->conn_recv_ancillary.crb_ipv6_recvdstopts;
872 			break;	/* goto sizeof (int) option return */
873 		case _OLD_IPV6_RECVDSTOPTS:
874 			*i1 =
875 			    connp->conn_recv_ancillary.crb_old_ipv6_recvdstopts;
876 			break;	/* goto sizeof (int) option return */
877 		case IPV6_RECVRTHDRDSTOPTS:
878 			*i1 = connp->conn_recv_ancillary.
879 			    crb_ipv6_recvrthdrdstopts;
880 			break;	/* goto sizeof (int) option return */
881 		case IPV6_RECVRTHDR:
882 			*i1 = connp->conn_recv_ancillary.crb_ipv6_recvrthdr;
883 			break;	/* goto sizeof (int) option return */
884 		case IPV6_PKTINFO: {
885 			/* XXX assumes that caller has room for max size! */
886 			struct in6_pktinfo *pkti;
887 
888 			pkti = (struct in6_pktinfo *)ptr;
889 			pkti->ipi6_ifindex = ixa->ixa_ifindex;
890 			if (ipp->ipp_fields & IPPF_ADDR)
891 				pkti->ipi6_addr = ipp->ipp_addr;
892 			else
893 				pkti->ipi6_addr = ipv6_all_zeros;
894 			return (sizeof (struct in6_pktinfo));
895 		}
896 		case IPV6_TCLASS:
897 			*i1 = ipp->ipp_tclass;
898 			break;	/* goto sizeof (int) option return */
899 		case IPV6_NEXTHOP: {
900 			sin6_t *sin6 = (sin6_t *)ptr;
901 
902 			if (ixa->ixa_flags & IXAF_NEXTHOP_SET)
903 				return (0);
904 
905 			*sin6 = sin6_null;
906 			sin6->sin6_family = AF_INET6;
907 			sin6->sin6_addr = ixa->ixa_nexthop_v6;
908 
909 			return (sizeof (sin6_t));
910 		}
911 		case IPV6_HOPOPTS:
912 			if (!(ipp->ipp_fields & IPPF_HOPOPTS))
913 				return (0);
914 			bcopy(ipp->ipp_hopopts, ptr,
915 			    ipp->ipp_hopoptslen);
916 			return (ipp->ipp_hopoptslen);
917 		case IPV6_RTHDRDSTOPTS:
918 			if (!(ipp->ipp_fields & IPPF_RTHDRDSTOPTS))
919 				return (0);
920 			bcopy(ipp->ipp_rthdrdstopts, ptr,
921 			    ipp->ipp_rthdrdstoptslen);
922 			return (ipp->ipp_rthdrdstoptslen);
923 		case IPV6_RTHDR:
924 			if (!(ipp->ipp_fields & IPPF_RTHDR))
925 				return (0);
926 			bcopy(ipp->ipp_rthdr, ptr, ipp->ipp_rthdrlen);
927 			return (ipp->ipp_rthdrlen);
928 		case IPV6_DSTOPTS:
929 			if (!(ipp->ipp_fields & IPPF_DSTOPTS))
930 				return (0);
931 			bcopy(ipp->ipp_dstopts, ptr, ipp->ipp_dstoptslen);
932 			return (ipp->ipp_dstoptslen);
933 		case IPV6_PATHMTU:
934 			return (ip_fill_mtuinfo(connp, ixa,
935 			    (struct ip6_mtuinfo *)ptr));
936 		case IPV6_SEC_OPT:
937 			return (ipsec_req_from_conn(connp, (ipsec_req_t	*)ptr,
938 			    IPSEC_AF_V6));
939 		case IPV6_SRC_PREFERENCES:
940 			return (ip6_get_src_preferences(ixa, (uint32_t *)ptr));
941 		case IPV6_DONTFRAG:
942 			*i1 = (ixa->ixa_flags & IXAF_DONTFRAG) != 0;
943 			return (sizeof (int));
944 		case IPV6_USE_MIN_MTU:
945 			if (ixa->ixa_flags & IXAF_USE_MIN_MTU)
946 				*i1 = ixa->ixa_use_min_mtu;
947 			else
948 				*i1 = IPV6_USE_MIN_MTU_MULTICAST;
949 			break;
950 		case IPV6_V6ONLY:
951 			*i1 = connp->conn_ipv6_v6only;
952 			return (sizeof (int));
953 		default:
954 			return (-1);
955 		}
956 		break;
957 	case IPPROTO_UDP:
958 		switch (name) {
959 		case UDP_ANONPRIVBIND:
960 			*i1 = connp->conn_anon_priv_bind;
961 			break;
962 		case UDP_EXCLBIND:
963 			*i1 = connp->conn_exclbind ? UDP_EXCLBIND : 0;
964 			break;
965 		default:
966 			return (-1);
967 		}
968 		break;
969 	case IPPROTO_TCP:
970 		switch (name) {
971 		case TCP_RECVDSTADDR:
972 			*i1 = connp->conn_recv_ancillary.crb_recvdstaddr;
973 			break;
974 		case TCP_ANONPRIVBIND:
975 			*i1 = connp->conn_anon_priv_bind;
976 			break;
977 		case TCP_EXCLBIND:
978 			*i1 = connp->conn_exclbind ? TCP_EXCLBIND : 0;
979 			break;
980 		default:
981 			return (-1);
982 		}
983 		break;
984 	default:
985 		return (-1);
986 	}
987 	return (sizeof (int));
988 }
989 
990 static int conn_opt_set_socket(conn_opt_arg_t *coa, t_scalar_t name,
991     uint_t inlen, uchar_t *invalp, boolean_t checkonly, cred_t *cr);
992 static int conn_opt_set_ip(conn_opt_arg_t *coa, t_scalar_t name,
993     uint_t inlen, uchar_t *invalp, boolean_t checkonly, cred_t *cr);
994 static int conn_opt_set_ipv6(conn_opt_arg_t *coa, t_scalar_t name,
995     uint_t inlen, uchar_t *invalp, boolean_t checkonly, cred_t *cr);
996 static int conn_opt_set_udp(conn_opt_arg_t *coa, t_scalar_t name,
997     uint_t inlen, uchar_t *invalp, boolean_t checkonly, cred_t *cr);
998 static int conn_opt_set_tcp(conn_opt_arg_t *coa, t_scalar_t name,
999     uint_t inlen, uchar_t *invalp, boolean_t checkonly, cred_t *cr);
1000 
1001 /*
1002  * This routine sets the most common socket options including some
1003  * that are transport/ULP specific.
1004  * It returns errno or zero.
1005  *
1006  * For fixed length options, there is no sanity check
1007  * of passed in length is done. It is assumed *_optcom_req()
1008  * routines do the right thing.
1009  */
1010 int
1011 conn_opt_set(conn_opt_arg_t *coa, t_scalar_t level, t_scalar_t name,
1012     uint_t inlen, uchar_t *invalp, boolean_t checkonly, cred_t *cr)
1013 {
1014 	ASSERT(MUTEX_NOT_HELD(&coa->coa_connp->conn_lock));
1015 
1016 	/* We have different functions for different levels */
1017 	switch (level) {
1018 	case SOL_SOCKET:
1019 		return (conn_opt_set_socket(coa, name, inlen, invalp,
1020 		    checkonly, cr));
1021 	case IPPROTO_IP:
1022 		return (conn_opt_set_ip(coa, name, inlen, invalp,
1023 		    checkonly, cr));
1024 	case IPPROTO_IPV6:
1025 		return (conn_opt_set_ipv6(coa, name, inlen, invalp,
1026 		    checkonly, cr));
1027 	case IPPROTO_UDP:
1028 		return (conn_opt_set_udp(coa, name, inlen, invalp,
1029 		    checkonly, cr));
1030 	case IPPROTO_TCP:
1031 		return (conn_opt_set_tcp(coa, name, inlen, invalp,
1032 		    checkonly, cr));
1033 	default:
1034 		return (0);
1035 	}
1036 }
1037 
1038 /*
1039  * Handle SOL_SOCKET
1040  * Note that we do not handle SO_PROTOTYPE here. The ULPs that support
1041  * it implement their own checks and setting of conn_proto.
1042  */
1043 /* ARGSUSED1 */
1044 static int
1045 conn_opt_set_socket(conn_opt_arg_t *coa, t_scalar_t name, uint_t inlen,
1046     uchar_t *invalp, boolean_t checkonly, cred_t *cr)
1047 {
1048 	conn_t		*connp = coa->coa_connp;
1049 	ip_xmit_attr_t	*ixa = coa->coa_ixa;
1050 	int		*i1 = (int *)invalp;
1051 	boolean_t	onoff = (*i1 == 0) ? 0 : 1;
1052 
1053 	switch (name) {
1054 	case SO_ALLZONES:
1055 		if (IPCL_IS_BOUND(connp))
1056 			return (EINVAL);
1057 		break;
1058 	case SO_VRRP:
1059 		if (secpolicy_ip_config(cr, checkonly) != 0)
1060 			return (EACCES);
1061 		break;
1062 	case SO_MAC_EXEMPT:
1063 		if (secpolicy_net_mac_aware(cr) != 0)
1064 			return (EACCES);
1065 		if (IPCL_IS_BOUND(connp))
1066 			return (EINVAL);
1067 		break;
1068 	case SO_MAC_IMPLICIT:
1069 		if (secpolicy_net_mac_implicit(cr) != 0)
1070 			return (EACCES);
1071 		break;
1072 	}
1073 	if (checkonly)
1074 		return (0);
1075 
1076 	mutex_enter(&connp->conn_lock);
1077 	/* Here we set the actual option value */
1078 	switch (name) {
1079 	case SO_DEBUG:
1080 		connp->conn_debug = onoff;
1081 		break;
1082 	case SO_KEEPALIVE:
1083 		connp->conn_keepalive = onoff;
1084 		break;
1085 	case SO_LINGER: {
1086 		struct linger *lgr = (struct linger *)invalp;
1087 
1088 		if (lgr->l_onoff) {
1089 			connp->conn_linger = 1;
1090 			connp->conn_lingertime = lgr->l_linger;
1091 		} else {
1092 			connp->conn_linger = 0;
1093 			connp->conn_lingertime = 0;
1094 		}
1095 		break;
1096 	}
1097 	case SO_OOBINLINE:
1098 		connp->conn_oobinline = onoff;
1099 		coa->coa_changed |= COA_OOBINLINE_CHANGED;
1100 		break;
1101 	case SO_REUSEADDR:
1102 		connp->conn_reuseaddr = onoff;
1103 		break;
1104 	case SO_DONTROUTE:
1105 		if (onoff)
1106 			ixa->ixa_flags |= IXAF_DONTROUTE;
1107 		else
1108 			ixa->ixa_flags &= ~IXAF_DONTROUTE;
1109 		coa->coa_changed |= COA_ROUTE_CHANGED;
1110 		break;
1111 	case SO_USELOOPBACK:
1112 		connp->conn_useloopback = onoff;
1113 		break;
1114 	case SO_BROADCAST:
1115 		connp->conn_broadcast = onoff;
1116 		break;
1117 	case SO_SNDBUF:
1118 		/* ULP has range checked the value */
1119 		connp->conn_sndbuf = *i1;
1120 		coa->coa_changed |= COA_SNDBUF_CHANGED;
1121 		break;
1122 	case SO_RCVBUF:
1123 		/* ULP has range checked the value */
1124 		connp->conn_rcvbuf = *i1;
1125 		coa->coa_changed |= COA_RCVBUF_CHANGED;
1126 		break;
1127 	case SO_RCVTIMEO:
1128 	case SO_SNDTIMEO:
1129 		/*
1130 		 * Pass these two options in order for third part
1131 		 * protocol usage.
1132 		 */
1133 		break;
1134 	case SO_DGRAM_ERRIND:
1135 		connp->conn_dgram_errind = onoff;
1136 		break;
1137 	case SO_RECVUCRED:
1138 		connp->conn_recv_ancillary.crb_recvucred = onoff;
1139 		break;
1140 	case SO_ALLZONES:
1141 		connp->conn_allzones = onoff;
1142 		coa->coa_changed |= COA_ROUTE_CHANGED;
1143 		if (onoff)
1144 			ixa->ixa_zoneid = ALL_ZONES;
1145 		else
1146 			ixa->ixa_zoneid = connp->conn_zoneid;
1147 		break;
1148 	case SO_TIMESTAMP:
1149 		connp->conn_recv_ancillary.crb_timestamp = onoff;
1150 		break;
1151 	case SO_VRRP:
1152 		connp->conn_isvrrp = onoff;
1153 		break;
1154 	case SO_ANON_MLP:
1155 		connp->conn_anon_mlp = onoff;
1156 		break;
1157 	case SO_MAC_EXEMPT:
1158 		connp->conn_mac_mode = onoff ?
1159 		    CONN_MAC_AWARE : CONN_MAC_DEFAULT;
1160 		break;
1161 	case SO_MAC_IMPLICIT:
1162 		connp->conn_mac_mode = onoff ?
1163 		    CONN_MAC_IMPLICIT : CONN_MAC_DEFAULT;
1164 		break;
1165 	case SO_EXCLBIND:
1166 		connp->conn_exclbind = onoff;
1167 		break;
1168 	}
1169 	mutex_exit(&connp->conn_lock);
1170 	return (0);
1171 }
1172 
1173 /* Handle IPPROTO_IP */
1174 static int
1175 conn_opt_set_ip(conn_opt_arg_t *coa, t_scalar_t name, uint_t inlen,
1176     uchar_t *invalp, boolean_t checkonly, cred_t *cr)
1177 {
1178 	conn_t		*connp = coa->coa_connp;
1179 	ip_xmit_attr_t	*ixa = coa->coa_ixa;
1180 	ip_pkt_t	*ipp = coa->coa_ipp;
1181 	int		*i1 = (int *)invalp;
1182 	boolean_t	onoff = (*i1 == 0) ? 0 : 1;
1183 	ipaddr_t	addr = (ipaddr_t)*i1;
1184 	uint_t		ifindex;
1185 	zoneid_t	zoneid = IPCL_ZONEID(connp);
1186 	ipif_t		*ipif;
1187 	ip_stack_t	*ipst = connp->conn_netstack->netstack_ip;
1188 	int		error;
1189 
1190 	if (connp->conn_family != AF_INET)
1191 		return (EINVAL);
1192 
1193 	switch (name) {
1194 	case IP_TTL:
1195 		/* Don't allow zero */
1196 		if (*i1 < 1 || *i1 > 255)
1197 			return (EINVAL);
1198 		break;
1199 	case IP_MULTICAST_IF:
1200 		if (addr == INADDR_ANY) {
1201 			/* Clear */
1202 			ifindex = 0;
1203 			break;
1204 		}
1205 		ipif = ipif_lookup_addr(addr, NULL, zoneid, ipst);
1206 		if (ipif == NULL)
1207 			return (EHOSTUNREACH);
1208 		/* not supported by the virtual network iface */
1209 		if (IS_VNI(ipif->ipif_ill)) {
1210 			ipif_refrele(ipif);
1211 			return (EINVAL);
1212 		}
1213 		ifindex = ipif->ipif_ill->ill_phyint->phyint_ifindex;
1214 		ipif_refrele(ipif);
1215 		break;
1216 	case IP_NEXTHOP: {
1217 		ire_t	*ire;
1218 
1219 		if (addr == INADDR_ANY) {
1220 			/* Clear */
1221 			break;
1222 		}
1223 		/* Verify that the next-hop is on-link */
1224 		ire = ire_ftable_lookup_v4(addr, 0, 0, IRE_ONLINK, NULL, zoneid,
1225 		    NULL, MATCH_IRE_TYPE, 0, ipst, NULL);
1226 		if (ire == NULL)
1227 			return (EHOSTUNREACH);
1228 		ire_refrele(ire);
1229 		break;
1230 	}
1231 	case IP_OPTIONS:
1232 	case T_IP_OPTIONS: {
1233 		uint_t newlen;
1234 
1235 		if (ipp->ipp_fields & IPPF_LABEL_V4)
1236 			newlen = inlen + (ipp->ipp_label_len_v4 + 3) & ~3;
1237 		else
1238 			newlen = inlen;
1239 		if ((inlen & 0x3) || newlen > IP_MAX_OPT_LENGTH) {
1240 			return (EINVAL);
1241 		}
1242 		break;
1243 	}
1244 	case IP_PKTINFO: {
1245 		struct in_pktinfo *pktinfo;
1246 
1247 		/* Two different valid lengths */
1248 		if (inlen != sizeof (int) &&
1249 		    inlen != sizeof (struct in_pktinfo))
1250 			return (EINVAL);
1251 		if (inlen == sizeof (int))
1252 			break;
1253 
1254 		pktinfo = (struct in_pktinfo *)invalp;
1255 		if (pktinfo->ipi_spec_dst.s_addr != INADDR_ANY) {
1256 			switch (ip_laddr_verify_v4(pktinfo->ipi_spec_dst.s_addr,
1257 			    zoneid, ipst, B_FALSE)) {
1258 			case IPVL_UNICAST_UP:
1259 			case IPVL_UNICAST_DOWN:
1260 				break;
1261 			default:
1262 				return (EADDRNOTAVAIL);
1263 			}
1264 		}
1265 		if (!ip_xmit_ifindex_valid(pktinfo->ipi_ifindex, zoneid,
1266 		    B_FALSE, ipst))
1267 			return (ENXIO);
1268 		break;
1269 	}
1270 	case IP_BOUND_IF:
1271 		ifindex = *(uint_t *)i1;
1272 
1273 		/* Just check it is ok. */
1274 		if (!ip_xmit_ifindex_valid(ifindex, zoneid, B_FALSE, ipst))
1275 			return (ENXIO);
1276 		break;
1277 	}
1278 	if (checkonly)
1279 		return (0);
1280 
1281 	/* Here we set the actual option value */
1282 	/*
1283 	 * conn_lock protects the bitfields, and is used to
1284 	 * set the fields atomically. Not needed for ixa settings since
1285 	 * the caller has an exclusive copy of the ixa.
1286 	 * We can not hold conn_lock across the multicast options though.
1287 	 */
1288 	switch (name) {
1289 	case IP_OPTIONS:
1290 	case T_IP_OPTIONS:
1291 		/* Save options for use by IP. */
1292 		mutex_enter(&connp->conn_lock);
1293 		error = optcom_pkt_set(invalp, inlen,
1294 		    (uchar_t **)&ipp->ipp_ipv4_options,
1295 		    &ipp->ipp_ipv4_options_len);
1296 		if (error != 0) {
1297 			mutex_exit(&connp->conn_lock);
1298 			return (error);
1299 		}
1300 		if (ipp->ipp_ipv4_options_len == 0) {
1301 			ipp->ipp_fields &= ~IPPF_IPV4_OPTIONS;
1302 		} else {
1303 			ipp->ipp_fields |= IPPF_IPV4_OPTIONS;
1304 		}
1305 		mutex_exit(&connp->conn_lock);
1306 		coa->coa_changed |= COA_HEADER_CHANGED;
1307 		coa->coa_changed |= COA_WROFF_CHANGED;
1308 		break;
1309 
1310 	case IP_TTL:
1311 		mutex_enter(&connp->conn_lock);
1312 		ipp->ipp_unicast_hops = *i1;
1313 		mutex_exit(&connp->conn_lock);
1314 		coa->coa_changed |= COA_HEADER_CHANGED;
1315 		break;
1316 	case IP_TOS:
1317 	case T_IP_TOS:
1318 		mutex_enter(&connp->conn_lock);
1319 		if (*i1 == -1) {
1320 			ipp->ipp_type_of_service = 0;
1321 		} else {
1322 			ipp->ipp_type_of_service = *i1;
1323 		}
1324 		mutex_exit(&connp->conn_lock);
1325 		coa->coa_changed |= COA_HEADER_CHANGED;
1326 		break;
1327 	case IP_MULTICAST_IF:
1328 		ixa->ixa_multicast_ifindex = ifindex;
1329 		ixa->ixa_multicast_ifaddr = addr;
1330 		coa->coa_changed |= COA_ROUTE_CHANGED;
1331 		break;
1332 	case IP_MULTICAST_TTL:
1333 		ixa->ixa_multicast_ttl = *invalp;
1334 		/* Handled automatically by ip_output */
1335 		break;
1336 	case IP_MULTICAST_LOOP:
1337 		if (*invalp != 0)
1338 			ixa->ixa_flags |= IXAF_MULTICAST_LOOP;
1339 		else
1340 			ixa->ixa_flags &= ~IXAF_MULTICAST_LOOP;
1341 		/* Handled automatically by ip_output */
1342 		break;
1343 	case IP_RECVOPTS:
1344 		mutex_enter(&connp->conn_lock);
1345 		connp->conn_recv_ancillary.crb_recvopts = onoff;
1346 		mutex_exit(&connp->conn_lock);
1347 		break;
1348 	case IP_RECVDSTADDR:
1349 		mutex_enter(&connp->conn_lock);
1350 		connp->conn_recv_ancillary.crb_recvdstaddr = onoff;
1351 		mutex_exit(&connp->conn_lock);
1352 		break;
1353 	case IP_RECVIF:
1354 		mutex_enter(&connp->conn_lock);
1355 		connp->conn_recv_ancillary.crb_recvif = onoff;
1356 		mutex_exit(&connp->conn_lock);
1357 		break;
1358 	case IP_RECVSLLA:
1359 		mutex_enter(&connp->conn_lock);
1360 		connp->conn_recv_ancillary.crb_recvslla = onoff;
1361 		mutex_exit(&connp->conn_lock);
1362 		break;
1363 	case IP_RECVTTL:
1364 		mutex_enter(&connp->conn_lock);
1365 		connp->conn_recv_ancillary.crb_recvttl = onoff;
1366 		mutex_exit(&connp->conn_lock);
1367 		break;
1368 	case IP_PKTINFO: {
1369 		/*
1370 		 * This also handles IP_RECVPKTINFO.
1371 		 * IP_PKTINFO and IP_RECVPKTINFO have same value.
1372 		 * Differentiation is based on the size of the
1373 		 * argument passed in.
1374 		 */
1375 		struct in_pktinfo *pktinfo;
1376 
1377 		if (inlen == sizeof (int)) {
1378 			/* This is IP_RECVPKTINFO option. */
1379 			mutex_enter(&connp->conn_lock);
1380 			connp->conn_recv_ancillary.crb_ip_recvpktinfo =
1381 			    onoff;
1382 			mutex_exit(&connp->conn_lock);
1383 			break;
1384 		}
1385 
1386 		/* This is IP_PKTINFO option. */
1387 		mutex_enter(&connp->conn_lock);
1388 		pktinfo = (struct in_pktinfo *)invalp;
1389 		if (ipp->ipp_addr_v4 != INADDR_ANY) {
1390 			ipp->ipp_fields |= IPPF_ADDR;
1391 			IN6_INADDR_TO_V4MAPPED(&pktinfo->ipi_spec_dst,
1392 			    &ipp->ipp_addr);
1393 		} else {
1394 			ipp->ipp_fields &= ~IPPF_ADDR;
1395 			ipp->ipp_addr = ipv6_all_zeros;
1396 		}
1397 		mutex_exit(&connp->conn_lock);
1398 		ixa->ixa_ifindex = pktinfo->ipi_ifindex;
1399 		coa->coa_changed |= COA_ROUTE_CHANGED;
1400 		coa->coa_changed |= COA_HEADER_CHANGED;
1401 		break;
1402 	}
1403 	case IP_DONTFRAG:
1404 		if (onoff) {
1405 			ixa->ixa_flags |= (IXAF_DONTFRAG | IXAF_PMTU_IPV4_DF);
1406 			ixa->ixa_flags &= ~IXAF_PMTU_DISCOVERY;
1407 		} else {
1408 			ixa->ixa_flags &= ~(IXAF_DONTFRAG | IXAF_PMTU_IPV4_DF);
1409 			ixa->ixa_flags |= IXAF_PMTU_DISCOVERY;
1410 		}
1411 		/* Need to redo ip_attr_connect */
1412 		coa->coa_changed |= COA_ROUTE_CHANGED;
1413 		break;
1414 	case IP_ADD_MEMBERSHIP:
1415 	case IP_DROP_MEMBERSHIP:
1416 	case MCAST_JOIN_GROUP:
1417 	case MCAST_LEAVE_GROUP:
1418 		return (ip_opt_set_multicast_group(connp, name,
1419 		    invalp, B_FALSE, checkonly));
1420 
1421 	case IP_BLOCK_SOURCE:
1422 	case IP_UNBLOCK_SOURCE:
1423 	case IP_ADD_SOURCE_MEMBERSHIP:
1424 	case IP_DROP_SOURCE_MEMBERSHIP:
1425 	case MCAST_BLOCK_SOURCE:
1426 	case MCAST_UNBLOCK_SOURCE:
1427 	case MCAST_JOIN_SOURCE_GROUP:
1428 	case MCAST_LEAVE_SOURCE_GROUP:
1429 		return (ip_opt_set_multicast_sources(connp, name,
1430 		    invalp, B_FALSE, checkonly));
1431 
1432 	case IP_SEC_OPT:
1433 		mutex_enter(&connp->conn_lock);
1434 		error = ipsec_set_req(cr, connp, (ipsec_req_t *)invalp);
1435 		mutex_exit(&connp->conn_lock);
1436 		if (error != 0) {
1437 			return (error);
1438 		}
1439 		/* This is an IPsec policy change - redo ip_attr_connect */
1440 		coa->coa_changed |= COA_ROUTE_CHANGED;
1441 		break;
1442 	case IP_NEXTHOP:
1443 		ixa->ixa_nexthop_v4 = addr;
1444 		if (addr != INADDR_ANY)
1445 			ixa->ixa_flags |= IXAF_NEXTHOP_SET;
1446 		else
1447 			ixa->ixa_flags &= ~IXAF_NEXTHOP_SET;
1448 		coa->coa_changed |= COA_ROUTE_CHANGED;
1449 		break;
1450 
1451 	case IP_BOUND_IF:
1452 		ixa->ixa_ifindex = ifindex;		/* Send */
1453 		mutex_enter(&connp->conn_lock);
1454 		connp->conn_incoming_ifindex = ifindex;	/* Receive */
1455 		connp->conn_bound_if = ifindex;		/* getsockopt */
1456 		mutex_exit(&connp->conn_lock);
1457 		coa->coa_changed |= COA_ROUTE_CHANGED;
1458 		break;
1459 	case IP_UNSPEC_SRC:
1460 		mutex_enter(&connp->conn_lock);
1461 		connp->conn_unspec_src = onoff;
1462 		if (onoff)
1463 			ixa->ixa_flags &= ~IXAF_VERIFY_SOURCE;
1464 		else
1465 			ixa->ixa_flags |= IXAF_VERIFY_SOURCE;
1466 
1467 		mutex_exit(&connp->conn_lock);
1468 		break;
1469 	case IP_BROADCAST_TTL:
1470 		ixa->ixa_broadcast_ttl = *invalp;
1471 		ixa->ixa_flags |= IXAF_BROADCAST_TTL_SET;
1472 		/* Handled automatically by ip_output */
1473 		break;
1474 	case MRT_INIT:
1475 	case MRT_DONE:
1476 	case MRT_ADD_VIF:
1477 	case MRT_DEL_VIF:
1478 	case MRT_ADD_MFC:
1479 	case MRT_DEL_MFC:
1480 	case MRT_ASSERT:
1481 		if ((error = secpolicy_ip_config(cr, B_FALSE)) != 0) {
1482 			return (error);
1483 		}
1484 		error = ip_mrouter_set((int)name, connp, checkonly,
1485 		    (uchar_t *)invalp, inlen);
1486 		if (error) {
1487 			return (error);
1488 		}
1489 		return (0);
1490 
1491 	}
1492 	return (0);
1493 }
1494 
1495 /* Handle IPPROTO_IPV6 */
1496 static int
1497 conn_opt_set_ipv6(conn_opt_arg_t *coa, t_scalar_t name, uint_t inlen,
1498     uchar_t *invalp, boolean_t checkonly, cred_t *cr)
1499 {
1500 	conn_t		*connp = coa->coa_connp;
1501 	ip_xmit_attr_t	*ixa = coa->coa_ixa;
1502 	ip_pkt_t	*ipp = coa->coa_ipp;
1503 	int		*i1 = (int *)invalp;
1504 	boolean_t	onoff = (*i1 == 0) ? 0 : 1;
1505 	uint_t		ifindex;
1506 	zoneid_t	zoneid = IPCL_ZONEID(connp);
1507 	ip_stack_t	*ipst = connp->conn_netstack->netstack_ip;
1508 	int		error;
1509 
1510 	if (connp->conn_family != AF_INET6)
1511 		return (EINVAL);
1512 
1513 	switch (name) {
1514 	case IPV6_MULTICAST_IF:
1515 		/*
1516 		 * The only possible error is EINVAL.
1517 		 * We call this option on both V4 and V6
1518 		 * If both fail, then this call returns
1519 		 * EINVAL. If at least one of them succeeds we
1520 		 * return success.
1521 		 */
1522 		ifindex = *(uint_t *)i1;
1523 
1524 		if (!ip_xmit_ifindex_valid(ifindex, zoneid, B_TRUE, ipst) &&
1525 		    !ip_xmit_ifindex_valid(ifindex, zoneid, B_FALSE, ipst))
1526 			return (EINVAL);
1527 		break;
1528 	case IPV6_UNICAST_HOPS:
1529 		/* Don't allow zero. -1 means to use default */
1530 		if (*i1 < -1 || *i1 == 0 || *i1 > IPV6_MAX_HOPS)
1531 			return (EINVAL);
1532 		break;
1533 	case IPV6_MULTICAST_HOPS:
1534 		/* -1 means use default */
1535 		if (*i1 < -1 || *i1 > IPV6_MAX_HOPS)
1536 			return (EINVAL);
1537 		break;
1538 	case IPV6_MULTICAST_LOOP:
1539 		if (*i1 != 0 && *i1 != 1)
1540 			return (EINVAL);
1541 		break;
1542 	case IPV6_BOUND_IF:
1543 		ifindex = *(uint_t *)i1;
1544 
1545 		if (!ip_xmit_ifindex_valid(ifindex, zoneid, B_TRUE, ipst))
1546 			return (ENXIO);
1547 		break;
1548 	case IPV6_PKTINFO: {
1549 		struct in6_pktinfo *pkti;
1550 		boolean_t isv6;
1551 
1552 		if (inlen != 0 && inlen != sizeof (struct in6_pktinfo))
1553 			return (EINVAL);
1554 		if (inlen == 0)
1555 			break;	/* Clear values below */
1556 
1557 		/*
1558 		 * Verify the source address and ifindex. Privileged users
1559 		 * can use any source address.
1560 		 */
1561 		pkti = (struct in6_pktinfo *)invalp;
1562 
1563 		/*
1564 		 * For link-local addresses we use the ipi6_ifindex when
1565 		 * we verify the local address.
1566 		 * If net_rawaccess then any source address can be used.
1567 		 */
1568 		if (!IN6_IS_ADDR_UNSPECIFIED(&pkti->ipi6_addr) &&
1569 		    secpolicy_net_rawaccess(cr) != 0) {
1570 			uint_t scopeid = 0;
1571 			in6_addr_t *v6src = &pkti->ipi6_addr;
1572 			ipaddr_t v4src;
1573 			ip_laddr_t laddr_type = IPVL_UNICAST_UP;
1574 
1575 			if (IN6_IS_ADDR_V4MAPPED(v6src)) {
1576 				IN6_V4MAPPED_TO_IPADDR(v6src, v4src);
1577 				if (v4src != INADDR_ANY) {
1578 					laddr_type = ip_laddr_verify_v4(v4src,
1579 					    zoneid, ipst, B_FALSE);
1580 				}
1581 			} else {
1582 				if (IN6_IS_ADDR_LINKSCOPE(v6src))
1583 					scopeid = pkti->ipi6_ifindex;
1584 
1585 				laddr_type = ip_laddr_verify_v6(v6src, zoneid,
1586 				    ipst, B_FALSE, scopeid);
1587 			}
1588 			switch (laddr_type) {
1589 			case IPVL_UNICAST_UP:
1590 			case IPVL_UNICAST_DOWN:
1591 				break;
1592 			default:
1593 				return (EADDRNOTAVAIL);
1594 			}
1595 			ixa->ixa_flags |= IXAF_VERIFY_SOURCE;
1596 		} else if (!IN6_IS_ADDR_UNSPECIFIED(&pkti->ipi6_addr)) {
1597 			/* Allow any source */
1598 			ixa->ixa_flags &= ~IXAF_VERIFY_SOURCE;
1599 		}
1600 		isv6 = !(IN6_IS_ADDR_V4MAPPED(&pkti->ipi6_addr));
1601 		if (!ip_xmit_ifindex_valid(pkti->ipi6_ifindex, zoneid, isv6,
1602 		    ipst))
1603 			return (ENXIO);
1604 		break;
1605 	}
1606 	case IPV6_HOPLIMIT:
1607 		/* It is only allowed as ancilary data */
1608 		if (!coa->coa_ancillary)
1609 			return (EINVAL);
1610 
1611 		if (inlen != 0 && inlen != sizeof (int))
1612 			return (EINVAL);
1613 		if (inlen == sizeof (int)) {
1614 			if (*i1 > 255 || *i1 < -1 || *i1 == 0)
1615 				return (EINVAL);
1616 		}
1617 		break;
1618 	case IPV6_TCLASS:
1619 		if (inlen != 0 && inlen != sizeof (int))
1620 			return (EINVAL);
1621 		if (inlen == sizeof (int)) {
1622 			if (*i1 > 255 || *i1 < -1)
1623 				return (EINVAL);
1624 		}
1625 		break;
1626 	case IPV6_NEXTHOP:
1627 		if (inlen != 0 && inlen != sizeof (sin6_t))
1628 			return (EINVAL);
1629 		if (inlen == sizeof (sin6_t)) {
1630 			sin6_t *sin6 = (sin6_t *)invalp;
1631 			ire_t	*ire;
1632 
1633 			if (sin6->sin6_family != AF_INET6)
1634 				return (EAFNOSUPPORT);
1635 			if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr))
1636 				return (EADDRNOTAVAIL);
1637 
1638 			/* Verify that the next-hop is on-link */
1639 			ire = ire_ftable_lookup_v6(&sin6->sin6_addr,
1640 			    0, 0, IRE_ONLINK, NULL, zoneid,
1641 			    NULL, MATCH_IRE_TYPE, 0, ipst, NULL);
1642 			if (ire == NULL)
1643 				return (EHOSTUNREACH);
1644 			ire_refrele(ire);
1645 			break;
1646 		}
1647 		break;
1648 	case IPV6_RTHDR:
1649 	case IPV6_DSTOPTS:
1650 	case IPV6_RTHDRDSTOPTS:
1651 	case IPV6_HOPOPTS: {
1652 		/* All have the length field in the same place */
1653 		ip6_hbh_t *hopts = (ip6_hbh_t *)invalp;
1654 		/*
1655 		 * Sanity checks - minimum size, size a multiple of
1656 		 * eight bytes, and matching size passed in.
1657 		 */
1658 		if (inlen != 0 &&
1659 		    inlen != (8 * (hopts->ip6h_len + 1)))
1660 			return (EINVAL);
1661 		break;
1662 	}
1663 	case IPV6_PATHMTU:
1664 		/* Can't be set */
1665 		return (EINVAL);
1666 
1667 	case IPV6_USE_MIN_MTU:
1668 		if (inlen != sizeof (int))
1669 			return (EINVAL);
1670 		if (*i1 < -1 || *i1 > 1)
1671 			return (EINVAL);
1672 		break;
1673 	case IPV6_SRC_PREFERENCES:
1674 		if (inlen != sizeof (uint32_t))
1675 			return (EINVAL);
1676 		break;
1677 	case IPV6_V6ONLY:
1678 		if (*i1 < 0 || *i1 > 1) {
1679 			return (EINVAL);
1680 		}
1681 		break;
1682 	}
1683 	if (checkonly)
1684 		return (0);
1685 
1686 	/* Here we set the actual option value */
1687 	/*
1688 	 * conn_lock protects the bitfields, and is used to
1689 	 * set the fields atomically. Not needed for ixa settings since
1690 	 * the caller has an exclusive copy of the ixa.
1691 	 * We can not hold conn_lock across the multicast options though.
1692 	 */
1693 	ASSERT(MUTEX_NOT_HELD(&coa->coa_connp->conn_lock));
1694 	switch (name) {
1695 	case IPV6_MULTICAST_IF:
1696 		ixa->ixa_multicast_ifindex = ifindex;
1697 		/* Need to redo ip_attr_connect */
1698 		coa->coa_changed |= COA_ROUTE_CHANGED;
1699 		break;
1700 	case IPV6_UNICAST_HOPS:
1701 		/* -1 means use default */
1702 		mutex_enter(&connp->conn_lock);
1703 		if (*i1 == -1) {
1704 			ipp->ipp_unicast_hops = connp->conn_default_ttl;
1705 		} else {
1706 			ipp->ipp_unicast_hops = (uint8_t)*i1;
1707 		}
1708 		mutex_exit(&connp->conn_lock);
1709 		coa->coa_changed |= COA_HEADER_CHANGED;
1710 		break;
1711 	case IPV6_MULTICAST_HOPS:
1712 		/* -1 means use default */
1713 		if (*i1 == -1) {
1714 			ixa->ixa_multicast_ttl = IP_DEFAULT_MULTICAST_TTL;
1715 		} else {
1716 			ixa->ixa_multicast_ttl = (uint8_t)*i1;
1717 		}
1718 		/* Handled automatically by ip_output */
1719 		break;
1720 	case IPV6_MULTICAST_LOOP:
1721 		if (*i1 != 0)
1722 			ixa->ixa_flags |= IXAF_MULTICAST_LOOP;
1723 		else
1724 			ixa->ixa_flags &= ~IXAF_MULTICAST_LOOP;
1725 		/* Handled automatically by ip_output */
1726 		break;
1727 	case IPV6_JOIN_GROUP:
1728 	case IPV6_LEAVE_GROUP:
1729 	case MCAST_JOIN_GROUP:
1730 	case MCAST_LEAVE_GROUP:
1731 		return (ip_opt_set_multicast_group(connp, name,
1732 		    invalp, B_TRUE, checkonly));
1733 
1734 	case MCAST_BLOCK_SOURCE:
1735 	case MCAST_UNBLOCK_SOURCE:
1736 	case MCAST_JOIN_SOURCE_GROUP:
1737 	case MCAST_LEAVE_SOURCE_GROUP:
1738 		return (ip_opt_set_multicast_sources(connp, name,
1739 		    invalp, B_TRUE, checkonly));
1740 
1741 	case IPV6_BOUND_IF:
1742 		ixa->ixa_ifindex = ifindex;		/* Send */
1743 		mutex_enter(&connp->conn_lock);
1744 		connp->conn_incoming_ifindex = ifindex;	/* Receive */
1745 		connp->conn_bound_if = ifindex;		/* getsockopt */
1746 		mutex_exit(&connp->conn_lock);
1747 		coa->coa_changed |= COA_ROUTE_CHANGED;
1748 		break;
1749 	case IPV6_UNSPEC_SRC:
1750 		mutex_enter(&connp->conn_lock);
1751 		connp->conn_unspec_src = onoff;
1752 		if (onoff)
1753 			ixa->ixa_flags &= ~IXAF_VERIFY_SOURCE;
1754 		else
1755 			ixa->ixa_flags |= IXAF_VERIFY_SOURCE;
1756 		mutex_exit(&connp->conn_lock);
1757 		break;
1758 	case IPV6_RECVPKTINFO:
1759 		mutex_enter(&connp->conn_lock);
1760 		connp->conn_recv_ancillary.crb_ip_recvpktinfo = onoff;
1761 		mutex_exit(&connp->conn_lock);
1762 		break;
1763 	case IPV6_RECVTCLASS:
1764 		mutex_enter(&connp->conn_lock);
1765 		connp->conn_recv_ancillary.crb_ipv6_recvtclass = onoff;
1766 		mutex_exit(&connp->conn_lock);
1767 		break;
1768 	case IPV6_RECVPATHMTU:
1769 		mutex_enter(&connp->conn_lock);
1770 		connp->conn_ipv6_recvpathmtu = onoff;
1771 		mutex_exit(&connp->conn_lock);
1772 		break;
1773 	case IPV6_RECVHOPLIMIT:
1774 		mutex_enter(&connp->conn_lock);
1775 		connp->conn_recv_ancillary.crb_ipv6_recvhoplimit =
1776 		    onoff;
1777 		mutex_exit(&connp->conn_lock);
1778 		break;
1779 	case IPV6_RECVHOPOPTS:
1780 		mutex_enter(&connp->conn_lock);
1781 		connp->conn_recv_ancillary.crb_ipv6_recvhopopts = onoff;
1782 		mutex_exit(&connp->conn_lock);
1783 		break;
1784 	case IPV6_RECVDSTOPTS:
1785 		mutex_enter(&connp->conn_lock);
1786 		connp->conn_recv_ancillary.crb_ipv6_recvdstopts = onoff;
1787 		mutex_exit(&connp->conn_lock);
1788 		break;
1789 	case _OLD_IPV6_RECVDSTOPTS:
1790 		mutex_enter(&connp->conn_lock);
1791 		connp->conn_recv_ancillary.crb_old_ipv6_recvdstopts =
1792 		    onoff;
1793 		mutex_exit(&connp->conn_lock);
1794 		break;
1795 	case IPV6_RECVRTHDRDSTOPTS:
1796 		mutex_enter(&connp->conn_lock);
1797 		connp->conn_recv_ancillary.crb_ipv6_recvrthdrdstopts =
1798 		    onoff;
1799 		mutex_exit(&connp->conn_lock);
1800 		break;
1801 	case IPV6_RECVRTHDR:
1802 		mutex_enter(&connp->conn_lock);
1803 		connp->conn_recv_ancillary.crb_ipv6_recvrthdr = onoff;
1804 		mutex_exit(&connp->conn_lock);
1805 		break;
1806 	case IPV6_PKTINFO:
1807 		mutex_enter(&connp->conn_lock);
1808 		if (inlen == 0) {
1809 			ipp->ipp_fields &= ~IPPF_ADDR;
1810 			ipp->ipp_addr = ipv6_all_zeros;
1811 			ixa->ixa_ifindex = 0;
1812 		} else {
1813 			struct in6_pktinfo *pkti;
1814 
1815 			pkti = (struct in6_pktinfo *)invalp;
1816 			ipp->ipp_addr = pkti->ipi6_addr;
1817 			if (!IN6_IS_ADDR_UNSPECIFIED(&ipp->ipp_addr))
1818 				ipp->ipp_fields |= IPPF_ADDR;
1819 			else
1820 				ipp->ipp_fields &= ~IPPF_ADDR;
1821 			ixa->ixa_ifindex = pkti->ipi6_ifindex;
1822 		}
1823 		mutex_exit(&connp->conn_lock);
1824 		/* Source and ifindex might have changed */
1825 		coa->coa_changed |= COA_HEADER_CHANGED;
1826 		coa->coa_changed |= COA_ROUTE_CHANGED;
1827 		break;
1828 	case IPV6_HOPLIMIT:
1829 		mutex_enter(&connp->conn_lock);
1830 		if (inlen == 0 || *i1 == -1) {
1831 			/* Revert to default */
1832 			ipp->ipp_fields &= ~IPPF_HOPLIMIT;
1833 			ixa->ixa_flags &= ~IXAF_NO_TTL_CHANGE;
1834 		} else {
1835 			ipp->ipp_hoplimit = *i1;
1836 			ipp->ipp_fields |= IPPF_HOPLIMIT;
1837 			/* Ensure that it sticks for multicast packets */
1838 			ixa->ixa_flags |= IXAF_NO_TTL_CHANGE;
1839 		}
1840 		mutex_exit(&connp->conn_lock);
1841 		coa->coa_changed |= COA_HEADER_CHANGED;
1842 		break;
1843 	case IPV6_TCLASS:
1844 		/*
1845 		 * IPV6_TCLASS accepts -1 as use kernel default
1846 		 * and [0, 255] as the actualy traffic class.
1847 		 */
1848 		mutex_enter(&connp->conn_lock);
1849 		if (inlen == 0 || *i1 == -1) {
1850 			ipp->ipp_tclass = 0;
1851 			ipp->ipp_fields &= ~IPPF_TCLASS;
1852 		} else {
1853 			ipp->ipp_tclass = *i1;
1854 			ipp->ipp_fields |= IPPF_TCLASS;
1855 		}
1856 		mutex_exit(&connp->conn_lock);
1857 		coa->coa_changed |= COA_HEADER_CHANGED;
1858 		break;
1859 	case IPV6_NEXTHOP:
1860 		if (inlen == 0) {
1861 			ixa->ixa_flags &= ~IXAF_NEXTHOP_SET;
1862 		} else {
1863 			sin6_t *sin6 = (sin6_t *)invalp;
1864 
1865 			ixa->ixa_nexthop_v6 = sin6->sin6_addr;
1866 			if (!IN6_IS_ADDR_UNSPECIFIED(&ixa->ixa_nexthop_v6))
1867 				ixa->ixa_flags |= IXAF_NEXTHOP_SET;
1868 			else
1869 				ixa->ixa_flags &= ~IXAF_NEXTHOP_SET;
1870 		}
1871 		coa->coa_changed |= COA_ROUTE_CHANGED;
1872 		break;
1873 	case IPV6_HOPOPTS:
1874 		mutex_enter(&connp->conn_lock);
1875 		error = optcom_pkt_set(invalp, inlen,
1876 		    (uchar_t **)&ipp->ipp_hopopts, &ipp->ipp_hopoptslen);
1877 		if (error != 0) {
1878 			mutex_exit(&connp->conn_lock);
1879 			return (error);
1880 		}
1881 		if (ipp->ipp_hopoptslen == 0) {
1882 			ipp->ipp_fields &= ~IPPF_HOPOPTS;
1883 		} else {
1884 			ipp->ipp_fields |= IPPF_HOPOPTS;
1885 		}
1886 		mutex_exit(&connp->conn_lock);
1887 		coa->coa_changed |= COA_HEADER_CHANGED;
1888 		coa->coa_changed |= COA_WROFF_CHANGED;
1889 		break;
1890 	case IPV6_RTHDRDSTOPTS:
1891 		mutex_enter(&connp->conn_lock);
1892 		error = optcom_pkt_set(invalp, inlen,
1893 		    (uchar_t **)&ipp->ipp_rthdrdstopts,
1894 		    &ipp->ipp_rthdrdstoptslen);
1895 		if (error != 0) {
1896 			mutex_exit(&connp->conn_lock);
1897 			return (error);
1898 		}
1899 		if (ipp->ipp_rthdrdstoptslen == 0) {
1900 			ipp->ipp_fields &= ~IPPF_RTHDRDSTOPTS;
1901 		} else {
1902 			ipp->ipp_fields |= IPPF_RTHDRDSTOPTS;
1903 		}
1904 		mutex_exit(&connp->conn_lock);
1905 		coa->coa_changed |= COA_HEADER_CHANGED;
1906 		coa->coa_changed |= COA_WROFF_CHANGED;
1907 		break;
1908 	case IPV6_DSTOPTS:
1909 		mutex_enter(&connp->conn_lock);
1910 		error = optcom_pkt_set(invalp, inlen,
1911 		    (uchar_t **)&ipp->ipp_dstopts, &ipp->ipp_dstoptslen);
1912 		if (error != 0) {
1913 			mutex_exit(&connp->conn_lock);
1914 			return (error);
1915 		}
1916 		if (ipp->ipp_dstoptslen == 0) {
1917 			ipp->ipp_fields &= ~IPPF_DSTOPTS;
1918 		} else {
1919 			ipp->ipp_fields |= IPPF_DSTOPTS;
1920 		}
1921 		mutex_exit(&connp->conn_lock);
1922 		coa->coa_changed |= COA_HEADER_CHANGED;
1923 		coa->coa_changed |= COA_WROFF_CHANGED;
1924 		break;
1925 	case IPV6_RTHDR:
1926 		mutex_enter(&connp->conn_lock);
1927 		error = optcom_pkt_set(invalp, inlen,
1928 		    (uchar_t **)&ipp->ipp_rthdr, &ipp->ipp_rthdrlen);
1929 		if (error != 0) {
1930 			mutex_exit(&connp->conn_lock);
1931 			return (error);
1932 		}
1933 		if (ipp->ipp_rthdrlen == 0) {
1934 			ipp->ipp_fields &= ~IPPF_RTHDR;
1935 		} else {
1936 			ipp->ipp_fields |= IPPF_RTHDR;
1937 		}
1938 		mutex_exit(&connp->conn_lock);
1939 		coa->coa_changed |= COA_HEADER_CHANGED;
1940 		coa->coa_changed |= COA_WROFF_CHANGED;
1941 		break;
1942 
1943 	case IPV6_DONTFRAG:
1944 		if (onoff) {
1945 			ixa->ixa_flags |= IXAF_DONTFRAG;
1946 			ixa->ixa_flags &= ~IXAF_PMTU_DISCOVERY;
1947 		} else {
1948 			ixa->ixa_flags &= ~IXAF_DONTFRAG;
1949 			ixa->ixa_flags |= IXAF_PMTU_DISCOVERY;
1950 		}
1951 		/* Need to redo ip_attr_connect */
1952 		coa->coa_changed |= COA_ROUTE_CHANGED;
1953 		break;
1954 
1955 	case IPV6_USE_MIN_MTU:
1956 		ixa->ixa_flags |= IXAF_USE_MIN_MTU;
1957 		ixa->ixa_use_min_mtu = *i1;
1958 		/* Need to redo ip_attr_connect */
1959 		coa->coa_changed |= COA_ROUTE_CHANGED;
1960 		break;
1961 
1962 	case IPV6_SEC_OPT:
1963 		mutex_enter(&connp->conn_lock);
1964 		error = ipsec_set_req(cr, connp, (ipsec_req_t *)invalp);
1965 		mutex_exit(&connp->conn_lock);
1966 		if (error != 0) {
1967 			return (error);
1968 		}
1969 		/* This is an IPsec policy change - redo ip_attr_connect */
1970 		coa->coa_changed |= COA_ROUTE_CHANGED;
1971 		break;
1972 	case IPV6_SRC_PREFERENCES:
1973 		/*
1974 		 * This socket option only affects connected
1975 		 * sockets that haven't already bound to a specific
1976 		 * IPv6 address.  In other words, sockets that
1977 		 * don't call bind() with an address other than the
1978 		 * unspecified address and that call connect().
1979 		 * ip_set_destination_v6() passes these preferences
1980 		 * to the ipif_select_source_v6() function.
1981 		 */
1982 		mutex_enter(&connp->conn_lock);
1983 		error = ip6_set_src_preferences(ixa, *(uint32_t *)invalp);
1984 		mutex_exit(&connp->conn_lock);
1985 		if (error != 0) {
1986 			return (error);
1987 		}
1988 		break;
1989 	case IPV6_V6ONLY:
1990 		mutex_enter(&connp->conn_lock);
1991 		connp->conn_ipv6_v6only = onoff;
1992 		mutex_exit(&connp->conn_lock);
1993 		break;
1994 	}
1995 	return (0);
1996 }
1997 
1998 /* Handle IPPROTO_UDP */
1999 /* ARGSUSED1 */
2000 static int
2001 conn_opt_set_udp(conn_opt_arg_t *coa, t_scalar_t name, uint_t inlen,
2002     uchar_t *invalp, boolean_t checkonly, cred_t *cr)
2003 {
2004 	conn_t		*connp = coa->coa_connp;
2005 	int		*i1 = (int *)invalp;
2006 	boolean_t	onoff = (*i1 == 0) ? 0 : 1;
2007 	int		error;
2008 
2009 	switch (name) {
2010 	case UDP_ANONPRIVBIND:
2011 		if ((error = secpolicy_net_privaddr(cr, 0, IPPROTO_UDP)) != 0) {
2012 			return (error);
2013 		}
2014 		break;
2015 	}
2016 	if (checkonly)
2017 		return (0);
2018 
2019 	/* Here we set the actual option value */
2020 	mutex_enter(&connp->conn_lock);
2021 	switch (name) {
2022 	case UDP_ANONPRIVBIND:
2023 		connp->conn_anon_priv_bind = onoff;
2024 		break;
2025 	case UDP_EXCLBIND:
2026 		connp->conn_exclbind = onoff;
2027 		break;
2028 	}
2029 	mutex_exit(&connp->conn_lock);
2030 	return (0);
2031 }
2032 
2033 /* Handle IPPROTO_TCP */
2034 /* ARGSUSED1 */
2035 static int
2036 conn_opt_set_tcp(conn_opt_arg_t *coa, t_scalar_t name, uint_t inlen,
2037     uchar_t *invalp, boolean_t checkonly, cred_t *cr)
2038 {
2039 	conn_t		*connp = coa->coa_connp;
2040 	int		*i1 = (int *)invalp;
2041 	boolean_t	onoff = (*i1 == 0) ? 0 : 1;
2042 	int		error;
2043 
2044 	switch (name) {
2045 	case TCP_ANONPRIVBIND:
2046 		if ((error = secpolicy_net_privaddr(cr, 0, IPPROTO_TCP)) != 0) {
2047 			return (error);
2048 		}
2049 		break;
2050 	}
2051 	if (checkonly)
2052 		return (0);
2053 
2054 	/* Here we set the actual option value */
2055 	mutex_enter(&connp->conn_lock);
2056 	switch (name) {
2057 	case TCP_ANONPRIVBIND:
2058 		connp->conn_anon_priv_bind = onoff;
2059 		break;
2060 	case TCP_EXCLBIND:
2061 		connp->conn_exclbind = onoff;
2062 		break;
2063 	case TCP_RECVDSTADDR:
2064 		connp->conn_recv_ancillary.crb_recvdstaddr = onoff;
2065 		break;
2066 	}
2067 	mutex_exit(&connp->conn_lock);
2068 	return (0);
2069 }
2070 
2071 int
2072 conn_getsockname(conn_t *connp, struct sockaddr *sa, uint_t *salenp)
2073 {
2074 	sin_t		*sin;
2075 	sin6_t		*sin6;
2076 
2077 	if (connp->conn_family == AF_INET) {
2078 		if (*salenp < sizeof (sin_t))
2079 			return (EINVAL);
2080 
2081 		*salenp = sizeof (sin_t);
2082 		/* Fill zeroes and then initialize non-zero fields */
2083 		sin = (sin_t *)sa;
2084 		*sin = sin_null;
2085 		sin->sin_family = AF_INET;
2086 		if (!IN6_IS_ADDR_V4MAPPED_ANY(&connp->conn_saddr_v6) &&
2087 		    !IN6_IS_ADDR_UNSPECIFIED(&connp->conn_saddr_v6)) {
2088 			sin->sin_addr.s_addr = connp->conn_saddr_v4;
2089 		} else {
2090 			/*
2091 			 * INADDR_ANY
2092 			 * conn_saddr is not set, we might be bound to
2093 			 * broadcast/multicast. Use conn_bound_addr as
2094 			 * local address instead (that could
2095 			 * also still be INADDR_ANY)
2096 			 */
2097 			sin->sin_addr.s_addr = connp->conn_bound_addr_v4;
2098 		}
2099 		sin->sin_port = connp->conn_lport;
2100 	} else {
2101 		if (*salenp < sizeof (sin6_t))
2102 			return (EINVAL);
2103 
2104 		*salenp = sizeof (sin6_t);
2105 		/* Fill zeroes and then initialize non-zero fields */
2106 		sin6 = (sin6_t *)sa;
2107 		*sin6 = sin6_null;
2108 		sin6->sin6_family = AF_INET6;
2109 		if (!IN6_IS_ADDR_UNSPECIFIED(&connp->conn_saddr_v6)) {
2110 			sin6->sin6_addr = connp->conn_saddr_v6;
2111 		} else {
2112 			/*
2113 			 * conn_saddr is not set, we might be bound to
2114 			 * broadcast/multicast. Use conn_bound_addr as
2115 			 * local address instead (which could
2116 			 * also still be unspecified)
2117 			 */
2118 			sin6->sin6_addr = connp->conn_bound_addr_v6;
2119 		}
2120 		sin6->sin6_port = connp->conn_lport;
2121 		if (IN6_IS_ADDR_LINKSCOPE(&sin6->sin6_addr) &&
2122 		    (connp->conn_ixa->ixa_flags & IXAF_SCOPEID_SET))
2123 			sin6->sin6_scope_id = connp->conn_ixa->ixa_scopeid;
2124 	}
2125 	return (0);
2126 }
2127 
2128 int
2129 conn_getpeername(conn_t *connp, struct sockaddr *sa, uint_t *salenp)
2130 {
2131 	struct sockaddr_in	*sin;
2132 	struct sockaddr_in6	*sin6;
2133 
2134 	if (connp->conn_family == AF_INET) {
2135 		if (*salenp < sizeof (sin_t))
2136 			return (EINVAL);
2137 
2138 		*salenp = sizeof (sin_t);
2139 		/* initialize */
2140 		sin = (sin_t *)sa;
2141 		*sin = sin_null;
2142 		sin->sin_family = AF_INET;
2143 		sin->sin_addr.s_addr = connp->conn_faddr_v4;
2144 		sin->sin_port = connp->conn_fport;
2145 	} else {
2146 		if (*salenp < sizeof (sin6_t))
2147 			return (EINVAL);
2148 
2149 		*salenp = sizeof (sin6_t);
2150 		/* initialize */
2151 		sin6 = (sin6_t *)sa;
2152 		*sin6 = sin6_null;
2153 		sin6->sin6_family = AF_INET6;
2154 		sin6->sin6_addr = connp->conn_faddr_v6;
2155 		sin6->sin6_port =  connp->conn_fport;
2156 		sin6->sin6_flowinfo = connp->conn_flowinfo;
2157 		if (IN6_IS_ADDR_LINKSCOPE(&sin6->sin6_addr) &&
2158 		    (connp->conn_ixa->ixa_flags & IXAF_SCOPEID_SET))
2159 			sin6->sin6_scope_id = connp->conn_ixa->ixa_scopeid;
2160 	}
2161 	return (0);
2162 }
2163 
2164 static uint32_t	cksum_massage_options_v4(ipha_t *, netstack_t *);
2165 static uint32_t cksum_massage_options_v6(ip6_t *, uint_t, netstack_t *);
2166 
2167 /*
2168  * Allocate and fill in conn_ht_iphc based on the current information
2169  * in the conn.
2170  * Normally used when we bind() and connect().
2171  * Returns failure if can't allocate memory, or if there is a problem
2172  * with a routing header/option.
2173  *
2174  * We allocate space for the transport header (ulp_hdr_len + extra) and
2175  * indicate the offset of the ulp header by setting ixa_ip_hdr_length.
2176  * The extra is there for transports that want some spare room for future
2177  * options. conn_ht_iphc_allocated is what was allocated; conn_ht_iphc_len
2178  * excludes the extra part.
2179  *
2180  * We massage an routing option/header and store the ckecksum difference
2181  * in conn_sum.
2182  *
2183  * Caller needs to update conn_wroff if desired.
2184  */
2185 int
2186 conn_build_hdr_template(conn_t *connp, uint_t ulp_hdr_length, uint_t extra,
2187     const in6_addr_t *v6src, const in6_addr_t *v6dst, uint32_t flowinfo)
2188 {
2189 	ip_xmit_attr_t	*ixa = connp->conn_ixa;
2190 	ip_pkt_t	*ipp = &connp->conn_xmit_ipp;
2191 	uint_t		ip_hdr_length;
2192 	uchar_t		*hdrs;
2193 	uint_t		hdrs_len;
2194 
2195 	ASSERT(MUTEX_HELD(&connp->conn_lock));
2196 
2197 	if (ixa->ixa_flags & IXAF_IS_IPV4) {
2198 		ip_hdr_length = ip_total_hdrs_len_v4(ipp);
2199 		/* In case of TX label and IP options it can be too much */
2200 		if (ip_hdr_length > IP_MAX_HDR_LENGTH) {
2201 			/* Preserves existing TX errno for this */
2202 			return (EHOSTUNREACH);
2203 		}
2204 	} else {
2205 		ip_hdr_length = ip_total_hdrs_len_v6(ipp);
2206 	}
2207 	ixa->ixa_ip_hdr_length = ip_hdr_length;
2208 	hdrs_len = ip_hdr_length + ulp_hdr_length + extra;
2209 	ASSERT(hdrs_len != 0);
2210 
2211 	if (hdrs_len != connp->conn_ht_iphc_allocated) {
2212 		/* Allocate new before we free any old */
2213 		hdrs = kmem_alloc(hdrs_len, KM_NOSLEEP);
2214 		if (hdrs == NULL)
2215 			return (ENOMEM);
2216 
2217 		if (connp->conn_ht_iphc != NULL) {
2218 			kmem_free(connp->conn_ht_iphc,
2219 			    connp->conn_ht_iphc_allocated);
2220 		}
2221 		connp->conn_ht_iphc = hdrs;
2222 		connp->conn_ht_iphc_allocated = hdrs_len;
2223 	} else {
2224 		hdrs = connp->conn_ht_iphc;
2225 	}
2226 	hdrs_len -= extra;
2227 	connp->conn_ht_iphc_len = hdrs_len;
2228 
2229 	connp->conn_ht_ulp = hdrs + ip_hdr_length;
2230 	connp->conn_ht_ulp_len = ulp_hdr_length;
2231 
2232 	if (ixa->ixa_flags & IXAF_IS_IPV4) {
2233 		ipha_t	*ipha = (ipha_t *)hdrs;
2234 
2235 		IN6_V4MAPPED_TO_IPADDR(v6src, ipha->ipha_src);
2236 		IN6_V4MAPPED_TO_IPADDR(v6dst, ipha->ipha_dst);
2237 		ip_build_hdrs_v4(hdrs, ip_hdr_length, ipp, connp->conn_proto);
2238 		ipha->ipha_length = htons(hdrs_len);
2239 		if (ixa->ixa_flags & IXAF_PMTU_IPV4_DF)
2240 			ipha->ipha_fragment_offset_and_flags |= IPH_DF_HTONS;
2241 		else
2242 			ipha->ipha_fragment_offset_and_flags &= ~IPH_DF_HTONS;
2243 
2244 		if (ipp->ipp_fields & IPPF_IPV4_OPTIONS) {
2245 			connp->conn_sum = cksum_massage_options_v4(ipha,
2246 			    connp->conn_netstack);
2247 		} else {
2248 			connp->conn_sum = 0;
2249 		}
2250 	} else {
2251 		ip6_t	*ip6h = (ip6_t *)hdrs;
2252 
2253 		ip6h->ip6_src = *v6src;
2254 		ip6h->ip6_dst = *v6dst;
2255 		ip_build_hdrs_v6(hdrs, ip_hdr_length, ipp, connp->conn_proto,
2256 		    flowinfo);
2257 		ip6h->ip6_plen = htons(hdrs_len - IPV6_HDR_LEN);
2258 
2259 		if (ipp->ipp_fields & IPPF_RTHDR) {
2260 			connp->conn_sum = cksum_massage_options_v6(ip6h,
2261 			    ip_hdr_length, connp->conn_netstack);
2262 
2263 			/*
2264 			 * Verify that the first hop isn't a mapped address.
2265 			 * Routers along the path need to do this verification
2266 			 * for subsequent hops.
2267 			 */
2268 			if (IN6_IS_ADDR_V4MAPPED(&ip6h->ip6_dst))
2269 				return (EADDRNOTAVAIL);
2270 
2271 		} else {
2272 			connp->conn_sum = 0;
2273 		}
2274 	}
2275 	return (0);
2276 }
2277 
2278 /*
2279  * Prepend a header template to data_mp based on the ip_pkt_t
2280  * and the passed in source, destination and protocol.
2281  *
2282  * Returns failure if can't allocate memory, in which case data_mp is freed.
2283  * We allocate space for the transport header (ulp_hdr_len) and
2284  * indicate the offset of the ulp header by setting ixa_ip_hdr_length.
2285  *
2286  * We massage an routing option/header and return the ckecksum difference
2287  * in *sump. This is in host byte order.
2288  *
2289  * Caller needs to update conn_wroff if desired.
2290  */
2291 mblk_t *
2292 conn_prepend_hdr(ip_xmit_attr_t *ixa, const ip_pkt_t *ipp,
2293     const in6_addr_t *v6src, const in6_addr_t *v6dst,
2294     uint8_t protocol, uint32_t flowinfo, uint_t ulp_hdr_length, mblk_t *data_mp,
2295     uint_t data_length, uint_t wroff_extra, uint32_t *sump, int *errorp)
2296 {
2297 	uint_t		ip_hdr_length;
2298 	uchar_t		*hdrs;
2299 	uint_t		hdrs_len;
2300 	mblk_t		*mp;
2301 
2302 	if (ixa->ixa_flags & IXAF_IS_IPV4) {
2303 		ip_hdr_length = ip_total_hdrs_len_v4(ipp);
2304 		ASSERT(ip_hdr_length <= IP_MAX_HDR_LENGTH);
2305 	} else {
2306 		ip_hdr_length = ip_total_hdrs_len_v6(ipp);
2307 	}
2308 	hdrs_len = ip_hdr_length + ulp_hdr_length;
2309 	ASSERT(hdrs_len != 0);
2310 
2311 	ixa->ixa_ip_hdr_length = ip_hdr_length;
2312 
2313 	/* Can we prepend to data_mp? */
2314 	if (data_mp != NULL &&
2315 	    data_mp->b_rptr - data_mp->b_datap->db_base >= hdrs_len &&
2316 	    data_mp->b_datap->db_ref == 1) {
2317 		hdrs = data_mp->b_rptr - hdrs_len;
2318 		data_mp->b_rptr = hdrs;
2319 		mp = data_mp;
2320 	} else {
2321 		mp = allocb(hdrs_len + wroff_extra, BPRI_MED);
2322 		if (mp == NULL) {
2323 			freemsg(data_mp);
2324 			*errorp = ENOMEM;
2325 			return (NULL);
2326 		}
2327 		mp->b_wptr = mp->b_datap->db_lim;
2328 		hdrs = mp->b_rptr = mp->b_wptr - hdrs_len;
2329 		mp->b_cont = data_mp;
2330 	}
2331 
2332 	/*
2333 	 * Set the source in the header. ip_build_hdrs_v4/v6 will overwrite it
2334 	 * if PKTINFO (aka IPPF_ADDR) was set.
2335 	 */
2336 	if (ixa->ixa_flags & IXAF_IS_IPV4) {
2337 		ipha_t *ipha = (ipha_t *)hdrs;
2338 
2339 		ASSERT(IN6_IS_ADDR_V4MAPPED(v6dst));
2340 		IN6_V4MAPPED_TO_IPADDR(v6src, ipha->ipha_src);
2341 		IN6_V4MAPPED_TO_IPADDR(v6dst, ipha->ipha_dst);
2342 		ip_build_hdrs_v4(hdrs, ip_hdr_length, ipp, protocol);
2343 		ipha->ipha_length = htons(hdrs_len + data_length);
2344 		if (ixa->ixa_flags & IXAF_PMTU_IPV4_DF)
2345 			ipha->ipha_fragment_offset_and_flags |= IPH_DF_HTONS;
2346 		else
2347 			ipha->ipha_fragment_offset_and_flags &= ~IPH_DF_HTONS;
2348 
2349 		if (ipp->ipp_fields & IPPF_IPV4_OPTIONS) {
2350 			*sump = cksum_massage_options_v4(ipha,
2351 			    ixa->ixa_ipst->ips_netstack);
2352 		} else {
2353 			*sump = 0;
2354 		}
2355 	} else {
2356 		ip6_t *ip6h = (ip6_t *)hdrs;
2357 
2358 		ip6h->ip6_src = *v6src;
2359 		ip6h->ip6_dst = *v6dst;
2360 		ip_build_hdrs_v6(hdrs, ip_hdr_length, ipp, protocol, flowinfo);
2361 		ip6h->ip6_plen = htons(hdrs_len + data_length - IPV6_HDR_LEN);
2362 
2363 		if (ipp->ipp_fields & IPPF_RTHDR) {
2364 			*sump = cksum_massage_options_v6(ip6h,
2365 			    ip_hdr_length, ixa->ixa_ipst->ips_netstack);
2366 
2367 			/*
2368 			 * Verify that the first hop isn't a mapped address.
2369 			 * Routers along the path need to do this verification
2370 			 * for subsequent hops.
2371 			 */
2372 			if (IN6_IS_ADDR_V4MAPPED(&ip6h->ip6_dst)) {
2373 				*errorp = EADDRNOTAVAIL;
2374 				freemsg(mp);
2375 				return (NULL);
2376 			}
2377 		} else {
2378 			*sump = 0;
2379 		}
2380 	}
2381 	return (mp);
2382 }
2383 
2384 /*
2385  * Massage a source route if any putting the first hop
2386  * in ipha_dst. Compute a starting value for the checksum which
2387  * takes into account that the original ipha_dst should be
2388  * included in the checksum but that IP will include the
2389  * first hop from the source route in the tcp checksum.
2390  */
2391 static uint32_t
2392 cksum_massage_options_v4(ipha_t *ipha, netstack_t *ns)
2393 {
2394 	in_addr_t	dst;
2395 	uint32_t	cksum;
2396 
2397 	/* Get last hop then diff against first hop */
2398 	cksum = ip_massage_options(ipha, ns);
2399 	cksum = (cksum & 0xFFFF) + (cksum >> 16);
2400 	dst = ipha->ipha_dst;
2401 	cksum -= ((dst >> 16) + (dst & 0xffff));
2402 	if ((int)cksum < 0)
2403 		cksum--;
2404 	cksum = (cksum & 0xFFFF) + (cksum >> 16);
2405 	cksum = (cksum & 0xFFFF) + (cksum >> 16);
2406 	ASSERT(cksum < 0x10000);
2407 	return (ntohs(cksum));
2408 }
2409 
2410 static uint32_t
2411 cksum_massage_options_v6(ip6_t *ip6h, uint_t ip_hdr_len, netstack_t *ns)
2412 {
2413 	uint8_t		*end;
2414 	ip6_rthdr_t	*rth;
2415 	uint32_t	cksum;
2416 
2417 	end = (uint8_t *)ip6h + ip_hdr_len;
2418 	rth = ip_find_rthdr_v6(ip6h, end);
2419 	if (rth == NULL)
2420 		return (0);
2421 
2422 	cksum = ip_massage_options_v6(ip6h, rth, ns);
2423 	cksum = (cksum & 0xFFFF) + (cksum >> 16);
2424 	ASSERT(cksum < 0x10000);
2425 	return (ntohs(cksum));
2426 }
2427 
2428 /*
2429  * ULPs that change the destination address need to call this for each
2430  * change to discard any state about a previous destination that might
2431  * have been multicast or multirt.
2432  */
2433 void
2434 ip_attr_newdst(ip_xmit_attr_t *ixa)
2435 {
2436 	ixa->ixa_flags &= ~(IXAF_LOOPBACK_COPY | IXAF_NO_HW_CKSUM |
2437 	    IXAF_NO_TTL_CHANGE | IXAF_IPV6_ADD_FRAGHDR |
2438 	    IXAF_NO_LOOP_ZONEID_SET);
2439 }
2440 
2441 /*
2442  * Determine the nexthop which will be used.
2443  * Normally this is just the destination, but if a IPv4 source route, or
2444  * IPv6 routing header, is in the ip_pkt_t then we extract the nexthop from
2445  * there.
2446  */
2447 void
2448 ip_attr_nexthop(const ip_pkt_t *ipp, const ip_xmit_attr_t *ixa,
2449     const in6_addr_t *dst, in6_addr_t *nexthop)
2450 {
2451 	if (!(ipp->ipp_fields & (IPPF_IPV4_OPTIONS|IPPF_RTHDR))) {
2452 		*nexthop = *dst;
2453 		return;
2454 	}
2455 	if (ixa->ixa_flags & IXAF_IS_IPV4) {
2456 		ipaddr_t v4dst;
2457 		ipaddr_t v4nexthop;
2458 
2459 		IN6_V4MAPPED_TO_IPADDR(dst, v4dst);
2460 		v4nexthop = ip_pkt_source_route_v4(ipp);
2461 		if (v4nexthop == INADDR_ANY)
2462 			v4nexthop = v4dst;
2463 
2464 		IN6_IPADDR_TO_V4MAPPED(v4nexthop, nexthop);
2465 	} else {
2466 		const in6_addr_t *v6nexthop;
2467 
2468 		v6nexthop = ip_pkt_source_route_v6(ipp);
2469 		if (v6nexthop == NULL)
2470 			v6nexthop = dst;
2471 
2472 		*nexthop = *v6nexthop;
2473 	}
2474 }
2475 
2476 /*
2477  * Update the ip_xmit_attr_t based the addresses, conn_xmit_ipp and conn_ixa.
2478  * If IPDF_IPSEC is set we cache the IPsec policy to handle the unconnected
2479  * case (connected latching is done in conn_connect).
2480  * Note that IPsec policy lookup requires conn_proto and conn_laddr to be
2481  * set, but doesn't otherwise use the conn_t.
2482  *
2483  * Caller must set/clear IXAF_IS_IPV4 as appropriately.
2484  * Caller must use ip_attr_nexthop() to determine the nexthop argument.
2485  *
2486  * The caller must NOT hold conn_lock (to avoid problems with ill_refrele
2487  * causing the squeue to run doing ipcl_walk grabbing conn_lock.)
2488  *
2489  * Updates laddrp and uinfo if they are non-NULL.
2490  *
2491  * TSOL notes: The callers if ip_attr_connect must check if the destination
2492  * is different than before and in that case redo conn_update_label.
2493  * The callers of conn_connect do not need that since conn_connect
2494  * performs the conn_update_label.
2495  */
2496 int
2497 ip_attr_connect(const conn_t *connp, ip_xmit_attr_t *ixa,
2498     const in6_addr_t *v6src, const in6_addr_t *v6dst,
2499     const in6_addr_t *v6nexthop, in_port_t dstport, in6_addr_t *laddrp,
2500     iulp_t *uinfo, uint32_t flags)
2501 {
2502 	in6_addr_t		laddr = *v6src;
2503 	int			error;
2504 
2505 	ASSERT(MUTEX_NOT_HELD(&connp->conn_lock));
2506 
2507 	if (connp->conn_zone_is_global)
2508 		flags |= IPDF_ZONE_IS_GLOBAL;
2509 	else
2510 		flags &= ~IPDF_ZONE_IS_GLOBAL;
2511 
2512 	/*
2513 	 * Lookup the route to determine a source address and the uinfo.
2514 	 * If the ULP has a source route option then the caller will
2515 	 * have set v6nexthop to be the first hop.
2516 	 */
2517 	if (ixa->ixa_flags & IXAF_IS_IPV4) {
2518 		ipaddr_t v4dst;
2519 		ipaddr_t v4src, v4nexthop;
2520 
2521 		IN6_V4MAPPED_TO_IPADDR(v6dst, v4dst);
2522 		IN6_V4MAPPED_TO_IPADDR(v6nexthop, v4nexthop);
2523 		IN6_V4MAPPED_TO_IPADDR(v6src, v4src);
2524 
2525 		if (connp->conn_unspec_src || v4src != INADDR_ANY)
2526 			flags &= ~IPDF_SELECT_SRC;
2527 		else
2528 			flags |= IPDF_SELECT_SRC;
2529 
2530 		error = ip_set_destination_v4(&v4src, v4dst, v4nexthop, ixa,
2531 		    uinfo, flags, connp->conn_mac_mode);
2532 		IN6_IPADDR_TO_V4MAPPED(v4src, &laddr);
2533 	} else {
2534 		if (connp->conn_unspec_src || !IN6_IS_ADDR_UNSPECIFIED(v6src))
2535 			flags &= ~IPDF_SELECT_SRC;
2536 		else
2537 			flags |= IPDF_SELECT_SRC;
2538 
2539 		error = ip_set_destination_v6(&laddr, v6dst, v6nexthop, ixa,
2540 		    uinfo, flags, connp->conn_mac_mode);
2541 	}
2542 	/* Pass out some address even if we hit a RTF_REJECT etc */
2543 	if (laddrp != NULL)
2544 		*laddrp = laddr;
2545 
2546 	if (error != 0)
2547 		return (error);
2548 
2549 	if (flags & IPDF_IPSEC) {
2550 		/*
2551 		 * Set any IPsec policy in ixa. Routine also looks at ULP
2552 		 * ports.
2553 		 */
2554 		ipsec_cache_outbound_policy(connp, v6src, v6dst, dstport, ixa);
2555 	}
2556 	return (0);
2557 }
2558 
2559 /*
2560  * Connect the conn based on the addresses, conn_xmit_ipp and conn_ixa.
2561  * Assumes that conn_faddr and conn_fport are already set. As such it is not
2562  * usable for SCTP, since SCTP has multiple faddrs.
2563  *
2564  * Caller must hold conn_lock to provide atomic constency between the
2565  * conn_t's addresses and the ixa.
2566  * NOTE: this function drops and reaquires conn_lock since it can't be
2567  * held across ip_attr_connect/ip_set_destination.
2568  *
2569  * The caller needs to handle inserting in the receive-side fanout when
2570  * appropriate after conn_connect returns.
2571  */
2572 int
2573 conn_connect(conn_t *connp, iulp_t *uinfo, uint32_t flags)
2574 {
2575 	ip_xmit_attr_t	*ixa = connp->conn_ixa;
2576 	in6_addr_t	nexthop;
2577 	in6_addr_t	saddr, faddr;
2578 	in_port_t	fport;
2579 	int		error;
2580 
2581 	ASSERT(MUTEX_HELD(&connp->conn_lock));
2582 
2583 	if (connp->conn_ipversion == IPV4_VERSION)
2584 		ixa->ixa_flags |= IXAF_IS_IPV4;
2585 	else
2586 		ixa->ixa_flags &= ~IXAF_IS_IPV4;
2587 
2588 	/* We do IPsec latching below - hence no caching in ip_attr_connect */
2589 	flags &= ~IPDF_IPSEC;
2590 
2591 	/* In case we had previously done an ip_attr_connect */
2592 	ip_attr_newdst(ixa);
2593 
2594 	/*
2595 	 * Determine the nexthop and copy the addresses before dropping
2596 	 * conn_lock.
2597 	 */
2598 	ip_attr_nexthop(&connp->conn_xmit_ipp, connp->conn_ixa,
2599 	    &connp->conn_faddr_v6, &nexthop);
2600 	saddr = connp->conn_saddr_v6;
2601 	faddr = connp->conn_faddr_v6;
2602 	fport = connp->conn_fport;
2603 
2604 	mutex_exit(&connp->conn_lock);
2605 	error = ip_attr_connect(connp, ixa, &saddr, &faddr, &nexthop, fport,
2606 	    &saddr, uinfo, flags | IPDF_VERIFY_DST);
2607 	mutex_enter(&connp->conn_lock);
2608 
2609 	/* Could have changed even if an error */
2610 	connp->conn_saddr_v6 = saddr;
2611 	if (error != 0)
2612 		return (error);
2613 
2614 	/*
2615 	 * Check whether Trusted Solaris policy allows communication with this
2616 	 * host, and pretend that the destination is unreachable if not.
2617 	 * Compute any needed label and place it in ipp_label_v4/v6.
2618 	 *
2619 	 * Later conn_build_hdr_template() takes ipp_label_v4/v6 to form
2620 	 * the packet.
2621 	 *
2622 	 * TSOL Note: Any concurrent threads would pick a different ixa
2623 	 * (and ipp if they are to change the ipp)  so we
2624 	 * don't have to worry about concurrent threads.
2625 	 */
2626 	if (is_system_labeled()) {
2627 		if (connp->conn_mlp_type != mlptSingle)
2628 			return (ECONNREFUSED);
2629 
2630 		/*
2631 		 * conn_update_label will set ipp_label* which will later
2632 		 * be used by conn_build_hdr_template.
2633 		 */
2634 		error = conn_update_label(connp, ixa,
2635 		    &connp->conn_faddr_v6, &connp->conn_xmit_ipp);
2636 		if (error != 0)
2637 			return (error);
2638 	}
2639 
2640 	/*
2641 	 * Ensure that we match on the selected local address.
2642 	 * This overrides conn_laddr in the case we had earlier bound to a
2643 	 * multicast or broadcast address.
2644 	 */
2645 	connp->conn_laddr_v6 = connp->conn_saddr_v6;
2646 
2647 	/*
2648 	 * Allow setting new policies.
2649 	 * The addresses/ports are already set, thus the IPsec policy calls
2650 	 * can handle their passed-in conn's.
2651 	 */
2652 	connp->conn_policy_cached = B_FALSE;
2653 
2654 	/*
2655 	 * Cache IPsec policy in this conn.  If we have per-socket policy,
2656 	 * we'll cache that.  If we don't, we'll inherit global policy.
2657 	 *
2658 	 * This is done before the caller inserts in the receive-side fanout.
2659 	 * Note that conn_policy_cached is set by ipsec_conn_cache_policy() even
2660 	 * for connections where we don't have a policy. This is to prevent
2661 	 * global policy lookups in the inbound path.
2662 	 *
2663 	 * If we insert before we set conn_policy_cached,
2664 	 * CONN_INBOUND_POLICY_PRESENT() check can still evaluate true
2665 	 * because global policy cound be non-empty. We normally call
2666 	 * ipsec_check_policy() for conn_policy_cached connections only if
2667 	 * conn_in_enforce_policy is set. But in this case,
2668 	 * conn_policy_cached can get set anytime since we made the
2669 	 * CONN_INBOUND_POLICY_PRESENT() check and ipsec_check_policy() is
2670 	 * called, which will make the above assumption false.  Thus, we
2671 	 * need to insert after we set conn_policy_cached.
2672 	 */
2673 	error = ipsec_conn_cache_policy(connp,
2674 	    connp->conn_ipversion == IPV4_VERSION);
2675 	if (error != 0)
2676 		return (error);
2677 
2678 	/*
2679 	 * We defer to do LSO check until here since now we have better idea
2680 	 * whether IPsec is present. If the underlying ill is LSO capable,
2681 	 * copy its capability in so the ULP can decide whether to enable LSO
2682 	 * on this connection. So far, only TCP/IPv4 is implemented, so won't
2683 	 * claim LSO for IPv6.
2684 	 *
2685 	 * Currently, won't enable LSO for IRE_LOOPBACK or IRE_LOCAL, because
2686 	 * the receiver can not handle it. Also not to enable LSO for MULTIRT.
2687 	 */
2688 	ixa->ixa_flags &= ~IXAF_LSO_CAPAB;
2689 
2690 	ASSERT(ixa->ixa_ire != NULL);
2691 	if (ixa->ixa_ipst->ips_ip_lso_outbound && (flags & IPDF_LSO) &&
2692 	    !(ixa->ixa_flags & IXAF_IPSEC_SECURE) &&
2693 	    !(ixa->ixa_ire->ire_type & (IRE_LOCAL | IRE_LOOPBACK)) &&
2694 	    !(ixa->ixa_ire->ire_flags & RTF_MULTIRT) &&
2695 	    (ixa->ixa_nce != NULL) &&
2696 	    ((ixa->ixa_flags & IXAF_IS_IPV4) ?
2697 	    ILL_LSO_TCP_IPV4_USABLE(ixa->ixa_nce->nce_ill) :
2698 	    ILL_LSO_TCP_IPV6_USABLE(ixa->ixa_nce->nce_ill))) {
2699 		ixa->ixa_lso_capab = *ixa->ixa_nce->nce_ill->ill_lso_capab;
2700 		ixa->ixa_flags |= IXAF_LSO_CAPAB;
2701 	}
2702 
2703 	/* Check whether ZEROCOPY capability is usable for this connection. */
2704 	ixa->ixa_flags &= ~IXAF_ZCOPY_CAPAB;
2705 
2706 	if ((flags & IPDF_ZCOPY) &&
2707 	    !(ixa->ixa_flags & IXAF_IPSEC_SECURE) &&
2708 	    !(ixa->ixa_ire->ire_type & (IRE_LOCAL | IRE_LOOPBACK)) &&
2709 	    !(ixa->ixa_ire->ire_flags & RTF_MULTIRT) &&
2710 	    (ixa->ixa_nce != NULL) &&
2711 	    ILL_ZCOPY_USABLE(ixa->ixa_nce->nce_ill)) {
2712 		ixa->ixa_flags |= IXAF_ZCOPY_CAPAB;
2713 	}
2714 	return (0);
2715 }
2716 
2717 /*
2718  * Predicates to check if the addresses match conn_last*
2719  */
2720 
2721 /*
2722  * Compare the conn against an address.
2723  * If using mapped addresses on AF_INET6 sockets, use the _v6 function
2724  */
2725 boolean_t
2726 conn_same_as_last_v4(conn_t *connp, sin_t *sin)
2727 {
2728 	ASSERT(connp->conn_family == AF_INET);
2729 	return (sin->sin_addr.s_addr == connp->conn_v4lastdst &&
2730 	    sin->sin_port == connp->conn_lastdstport);
2731 }
2732 
2733 /*
2734  * Compare, including for mapped addresses
2735  */
2736 boolean_t
2737 conn_same_as_last_v6(conn_t *connp, sin6_t *sin6)
2738 {
2739 	return (IN6_ARE_ADDR_EQUAL(&connp->conn_v6lastdst, &sin6->sin6_addr) &&
2740 	    sin6->sin6_port == connp->conn_lastdstport &&
2741 	    sin6->sin6_flowinfo == connp->conn_lastflowinfo &&
2742 	    sin6->sin6_scope_id == connp->conn_lastscopeid);
2743 }
2744 
2745 /*
2746  * Compute a label and place it in the ip_packet_t.
2747  * Handles IPv4 and IPv6.
2748  * The caller should have a correct ixa_tsl and ixa_zoneid and have
2749  * already called conn_connect or ip_attr_connect to ensure that tsol_check_dest
2750  * has been called.
2751  */
2752 int
2753 conn_update_label(const conn_t *connp, const ip_xmit_attr_t *ixa,
2754     const in6_addr_t *v6dst, ip_pkt_t *ipp)
2755 {
2756 	int		err;
2757 	ipaddr_t	v4dst;
2758 
2759 	if (IN6_IS_ADDR_V4MAPPED(v6dst)) {
2760 		uchar_t		opt_storage[IP_MAX_OPT_LENGTH];
2761 
2762 		IN6_V4MAPPED_TO_IPADDR(v6dst, v4dst);
2763 
2764 		err = tsol_compute_label_v4(ixa->ixa_tsl, ixa->ixa_zoneid,
2765 		    v4dst, opt_storage, ixa->ixa_ipst);
2766 		if (err == 0) {
2767 			/* Length contained in opt_storage[IPOPT_OLEN] */
2768 			err = optcom_pkt_set(opt_storage,
2769 			    opt_storage[IPOPT_OLEN],
2770 			    (uchar_t **)&ipp->ipp_label_v4,
2771 			    &ipp->ipp_label_len_v4);
2772 		}
2773 		if (err != 0) {
2774 			DTRACE_PROBE4(tx__ip__log__info__updatelabel,
2775 			    char *, "conn(1) failed to update options(2) "
2776 			    "on ixa(3)",
2777 			    conn_t *, connp, char *, opt_storage,
2778 			    ip_xmit_attr_t *, ixa);
2779 		}
2780 		if (ipp->ipp_label_len_v4 != 0)
2781 			ipp->ipp_fields |= IPPF_LABEL_V4;
2782 		else
2783 			ipp->ipp_fields &= ~IPPF_LABEL_V4;
2784 	} else {
2785 		uchar_t		opt_storage[TSOL_MAX_IPV6_OPTION];
2786 		uint_t		optlen;
2787 
2788 		err = tsol_compute_label_v6(ixa->ixa_tsl, ixa->ixa_zoneid,
2789 		    v6dst, opt_storage, ixa->ixa_ipst);
2790 		if (err == 0) {
2791 			/*
2792 			 * Note that ipp_label_v6 is just the option - not
2793 			 * the hopopts extension header.
2794 			 *
2795 			 * Length contained in opt_storage[IPOPT_OLEN], but
2796 			 * that doesn't include the two byte options header.
2797 			 */
2798 			optlen = opt_storage[IPOPT_OLEN];
2799 			if (optlen != 0)
2800 				optlen += 2;
2801 
2802 			err = optcom_pkt_set(opt_storage, optlen,
2803 			    (uchar_t **)&ipp->ipp_label_v6,
2804 			    &ipp->ipp_label_len_v6);
2805 		}
2806 		if (err != 0) {
2807 			DTRACE_PROBE4(tx__ip__log__info__updatelabel,
2808 			    char *, "conn(1) failed to update options(2) "
2809 			    "on ixa(3)",
2810 			    conn_t *, connp, char *, opt_storage,
2811 			    ip_xmit_attr_t *, ixa);
2812 		}
2813 		if (ipp->ipp_label_len_v6 != 0)
2814 			ipp->ipp_fields |= IPPF_LABEL_V6;
2815 		else
2816 			ipp->ipp_fields &= ~IPPF_LABEL_V6;
2817 	}
2818 	return (err);
2819 }
2820 
2821 /*
2822  * Inherit all options settings from the parent/listener to the eager.
2823  * Returns zero on success; ENOMEM if memory allocation failed.
2824  *
2825  * We assume that the eager has not had any work done i.e., the conn_ixa
2826  * and conn_xmit_ipp are all zero.
2827  * Furthermore we assume that no other thread can access the eager (because
2828  * it isn't inserted in any fanout list).
2829  */
2830 int
2831 conn_inherit_parent(conn_t *lconnp, conn_t *econnp)
2832 {
2833 	cred_t	*credp;
2834 	int	err;
2835 	void	*notify_cookie;
2836 	uint32_t xmit_hint;
2837 
2838 	econnp->conn_family = lconnp->conn_family;
2839 	econnp->conn_ipv6_v6only = lconnp->conn_ipv6_v6only;
2840 	econnp->conn_wq = lconnp->conn_wq;
2841 	econnp->conn_rq = lconnp->conn_rq;
2842 
2843 	/*
2844 	 * Make a safe copy of the transmit attributes.
2845 	 * conn_connect will later be used by the caller to setup the ire etc.
2846 	 */
2847 	ASSERT(econnp->conn_ixa->ixa_refcnt == 1);
2848 	ASSERT(econnp->conn_ixa->ixa_ire == NULL);
2849 	ASSERT(econnp->conn_ixa->ixa_dce == NULL);
2850 	ASSERT(econnp->conn_ixa->ixa_nce == NULL);
2851 
2852 	/* Preserve ixa_notify_cookie and xmit_hint */
2853 	notify_cookie = econnp->conn_ixa->ixa_notify_cookie;
2854 	xmit_hint = econnp->conn_ixa->ixa_xmit_hint;
2855 	ixa_safe_copy(lconnp->conn_ixa, econnp->conn_ixa);
2856 	econnp->conn_ixa->ixa_notify_cookie = notify_cookie;
2857 	econnp->conn_ixa->ixa_xmit_hint = xmit_hint;
2858 
2859 	econnp->conn_bound_if = lconnp->conn_bound_if;
2860 	econnp->conn_incoming_ifindex = lconnp->conn_incoming_ifindex;
2861 
2862 	/* Inherit all RECV options */
2863 	econnp->conn_recv_ancillary = lconnp->conn_recv_ancillary;
2864 
2865 	err = ip_pkt_copy(&lconnp->conn_xmit_ipp, &econnp->conn_xmit_ipp,
2866 	    KM_NOSLEEP);
2867 	if (err != 0)
2868 		return (err);
2869 
2870 	econnp->conn_zoneid = lconnp->conn_zoneid;
2871 	econnp->conn_allzones = lconnp->conn_allzones;
2872 
2873 	/* This is odd. Pick a flowlabel for each connection instead? */
2874 	econnp->conn_flowinfo = lconnp->conn_flowinfo;
2875 
2876 	econnp->conn_default_ttl = lconnp->conn_default_ttl;
2877 
2878 	/*
2879 	 * TSOL: tsol_input_proc() needs the eager's cred before the
2880 	 * eager is accepted
2881 	 */
2882 	ASSERT(lconnp->conn_cred != NULL);
2883 	econnp->conn_cred = credp = lconnp->conn_cred;
2884 	crhold(credp);
2885 	econnp->conn_cpid = lconnp->conn_cpid;
2886 	econnp->conn_open_time = ddi_get_lbolt64();
2887 
2888 	/*
2889 	 * Cache things in the ixa without any refhold.
2890 	 * Listener might not have set up ixa_cred
2891 	 */
2892 	econnp->conn_ixa->ixa_cred = econnp->conn_cred;
2893 	econnp->conn_ixa->ixa_cpid = econnp->conn_cpid;
2894 	if (is_system_labeled())
2895 		econnp->conn_ixa->ixa_tsl = crgetlabel(econnp->conn_cred);
2896 
2897 	/*
2898 	 * If the caller has the process-wide flag set, then default to MAC
2899 	 * exempt mode.  This allows read-down to unlabeled hosts.
2900 	 */
2901 	if (getpflags(NET_MAC_AWARE, credp) != 0)
2902 		econnp->conn_mac_mode = CONN_MAC_AWARE;
2903 
2904 	econnp->conn_zone_is_global = lconnp->conn_zone_is_global;
2905 
2906 	/*
2907 	 * We eliminate the need for sockfs to send down a T_SVR4_OPTMGMT_REQ
2908 	 * via soaccept()->soinheritoptions() which essentially applies
2909 	 * all the listener options to the new connection. The options that we
2910 	 * need to take care of are:
2911 	 * SO_DEBUG, SO_REUSEADDR, SO_KEEPALIVE, SO_DONTROUTE, SO_BROADCAST,
2912 	 * SO_USELOOPBACK, SO_OOBINLINE, SO_DGRAM_ERRIND, SO_LINGER,
2913 	 * SO_SNDBUF, SO_RCVBUF.
2914 	 *
2915 	 * SO_RCVBUF:	conn_rcvbuf is set.
2916 	 * SO_SNDBUF:	conn_sndbuf is set.
2917 	 */
2918 
2919 	/* Could we define a struct and use a struct copy for this? */
2920 	econnp->conn_sndbuf = lconnp->conn_sndbuf;
2921 	econnp->conn_rcvbuf = lconnp->conn_rcvbuf;
2922 	econnp->conn_sndlowat = lconnp->conn_sndlowat;
2923 	econnp->conn_rcvlowat = lconnp->conn_rcvlowat;
2924 	econnp->conn_dgram_errind = lconnp->conn_dgram_errind;
2925 	econnp->conn_oobinline = lconnp->conn_oobinline;
2926 	econnp->conn_debug = lconnp->conn_debug;
2927 	econnp->conn_keepalive = lconnp->conn_keepalive;
2928 	econnp->conn_linger = lconnp->conn_linger;
2929 	econnp->conn_lingertime = lconnp->conn_lingertime;
2930 
2931 	/* Set the IP options */
2932 	econnp->conn_broadcast = lconnp->conn_broadcast;
2933 	econnp->conn_useloopback = lconnp->conn_useloopback;
2934 	econnp->conn_reuseaddr = lconnp->conn_reuseaddr;
2935 	return (0);
2936 }
2937