xref: /titanic_51/usr/src/uts/common/inet/ip/ip_tunables.c (revision 0d928757379972073af9fb22bdc827b74e8ba6ac)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 1991, 2010, Oracle and/or its affiliates. All rights reserved.
23  */
24 /* Copyright (c) 1990 Mentat Inc. */
25 
26 #include <inet/ip.h>
27 #include <inet/ip6.h>
28 #include <inet/ip_if.h>
29 #include <inet/ip_ire.h>
30 #include <inet/ipclassifier.h>
31 #include <inet/ip_impl.h>
32 #include <inet/tunables.h>
33 #include <sys/sunddi.h>
34 #include <sys/policy.h>
35 
36 /* How long, in seconds, we allow frags to hang around. */
37 #define	IP_REASM_TIMEOUT	15
38 #define	IPV6_REASM_TIMEOUT	60
39 
40 /*
41  * Set ip{,6}_forwarding values. If the value is being set on an ill,
42  * find the ill and set the value on it. On the other hand if we are modifying
43  * global property, modify the global value and set the value on all the ills.
44  */
45 /* ARGSUSED */
46 static int
47 ip_set_forwarding(void *cbarg, cred_t *cr, mod_prop_info_t *pinfo,
48     const char *ifname, const void* pval, uint_t flags)
49 {
50 	char			*end;
51 	unsigned long		new_value;
52 	boolean_t 		per_ill, isv6;
53 	ill_walk_context_t 	ctx;
54 	ill_t 			*ill;
55 	ip_stack_t 		*ipst = (ip_stack_t *)cbarg;
56 
57 	if (flags & MOD_PROP_DEFAULT) {
58 		new_value = pinfo->prop_def_bval;
59 	} else {
60 		if (ddi_strtoul(pval, &end, 10, &new_value) != 0 ||
61 		    *end != '\0')
62 			return (EINVAL);
63 		if (new_value != B_TRUE && new_value != B_FALSE)
64 			return (EINVAL);
65 	}
66 
67 	per_ill = (ifname != NULL && ifname[0] != '\0');
68 	/*
69 	 * if it's not per ill then set the global property and bring all the
70 	 * ills up to date with the new global value.
71 	 */
72 	if (!per_ill)
73 		pinfo->prop_cur_bval = (new_value == 1 ? B_TRUE : B_FALSE);
74 
75 	isv6 = (pinfo->mpi_proto == MOD_PROTO_IPV6 ? B_TRUE : B_FALSE);
76 	rw_enter(&ipst->ips_ill_g_lock, RW_READER);
77 	if (isv6)
78 		ill = ILL_START_WALK_V6(&ctx, ipst);
79 	else
80 		ill = ILL_START_WALK_V4(&ctx, ipst);
81 
82 	for (; ill != NULL; ill = ill_next(&ctx, ill)) {
83 		/*
84 		 * if the property needs to be set on a particular
85 		 * interface, look for that interface.
86 		 */
87 		if (per_ill && strcmp(ifname, ill->ill_name) != 0)
88 			continue;
89 		(void) ill_forward_set(ill, new_value != 0);
90 	}
91 	rw_exit(&ipst->ips_ill_g_lock);
92 
93 	return (0);
94 }
95 
96 static int
97 ip_get_forwarding(void *cbarg, mod_prop_info_t *pinfo, const char *ifname,
98     void *pval, uint_t pr_size, uint_t flags)
99 {
100 	boolean_t 		value;
101 	ill_walk_context_t 	ctx;
102 	ill_t 			*ill;
103 	ip_stack_t 		*ipst =  (ip_stack_t *)cbarg;
104 	boolean_t		get_def = (flags & MOD_PROP_DEFAULT);
105 	boolean_t		get_perm = (flags & MOD_PROP_PERM);
106 	boolean_t		isv6;
107 	size_t			nbytes = 0;
108 
109 	if (get_perm) {
110 		nbytes = snprintf(pval, pr_size, "%d", MOD_PROP_PERM_RW);
111 		goto ret;
112 	} else if (get_def) {
113 		nbytes = snprintf(pval, pr_size, "%d", pinfo->prop_def_bval);
114 		goto ret;
115 	}
116 
117 	/*
118 	 * if per interface value is not asked for return the current
119 	 * global value
120 	 */
121 	if (ifname == NULL || ifname[0] == '\0') {
122 		nbytes = snprintf(pval, pr_size, "%d", pinfo->prop_cur_bval);
123 		goto ret;
124 	}
125 
126 	isv6 = (pinfo->mpi_proto == MOD_PROTO_IPV6 ? B_TRUE : B_FALSE);
127 	rw_enter(&ipst->ips_ill_g_lock, RW_READER);
128 	if (isv6)
129 		ill = ILL_START_WALK_V6(&ctx, ipst);
130 	else
131 		ill = ILL_START_WALK_V4(&ctx, ipst);
132 	for (; ill != NULL; ill = ill_next(&ctx, ill)) {
133 		/*
134 		 * if the property needs to be obtained on a particular
135 		 * interface, look for that interface.
136 		 */
137 		if (strcmp(ifname, ill->ill_name) == 0)
138 			break;
139 	}
140 	if (ill == NULL) {
141 		rw_exit(&ipst->ips_ill_g_lock);
142 		return (ENXIO);
143 	}
144 	value = ((ill->ill_flags & ILLF_ROUTER) ? B_TRUE : B_FALSE);
145 	rw_exit(&ipst->ips_ill_g_lock);
146 	nbytes = snprintf(pval, pr_size, "%d", value);
147 ret:
148 	if (nbytes >= pr_size)
149 		return (ENOBUFS);
150 	return (0);
151 }
152 
153 /*
154  * `ip_debug' is a global variable. So, we will be modifying the global
155  * variable here.
156  */
157 /* ARGSUSED */
158 int
159 ip_set_debug(void *cbarg, cred_t *cr, mod_prop_info_t *pinfo,
160     const char *ifname, const void* pval, uint_t flags)
161 {
162 	unsigned long 	new_value;
163 	int		err;
164 
165 	if (cr != NULL && secpolicy_net_config(cr, B_FALSE) != 0)
166 		return (EPERM);
167 
168 	if ((err = mod_uint32_value(pval, pinfo, flags, &new_value)) != 0)
169 		return (err);
170 	ip_debug = (uint32_t)new_value;
171 	return (0);
172 }
173 
174 /*
175  * ip_debug is a global property. For default, permission and value range
176  * we retrieve the value from `pinfo'. However for the current value we
177  * retrieve the value from the global variable `ip_debug'
178  */
179 /* ARGSUSED */
180 int
181 ip_get_debug(void *cbarg, mod_prop_info_t *pinfo, const char *ifname,
182     void *pval, uint_t psize, uint_t flags)
183 {
184 	boolean_t	get_def = (flags & MOD_PROP_DEFAULT);
185 	boolean_t	get_perm = (flags & MOD_PROP_PERM);
186 	boolean_t	get_range = (flags & MOD_PROP_POSSIBLE);
187 	size_t		nbytes;
188 
189 	bzero(pval, psize);
190 	if (get_perm)
191 		nbytes = snprintf(pval, psize, "%u", MOD_PROP_PERM_RW);
192 	else if (get_range)
193 		nbytes = snprintf(pval, psize, "%u-%u",
194 		    pinfo->prop_min_uval, pinfo->prop_max_uval);
195 	else if (get_def)
196 		nbytes = snprintf(pval, psize, "%u", pinfo->prop_def_uval);
197 	else
198 		nbytes = snprintf(pval, psize, "%u", ip_debug);
199 	if (nbytes >= psize)
200 		return (ENOBUFS);
201 	return (0);
202 }
203 
204 /*
205  * Set the CGTP (multirouting) filtering status. If the status is changed
206  * from active to transparent or from transparent to active, forward the
207  * new status to the filtering module (if loaded).
208  */
209 /* ARGSUSED */
210 static int
211 ip_set_cgtp_filter(void *cbarg, cred_t *cr, mod_prop_info_t *pinfo,
212     const char *ifname, const void* pval, uint_t flags)
213 {
214 	unsigned long	new_value;
215 	ip_stack_t	*ipst = (ip_stack_t *)cbarg;
216 	char		*end;
217 
218 	if (flags & MOD_PROP_DEFAULT) {
219 		new_value = pinfo->prop_def_bval;
220 	} else {
221 		if (ddi_strtoul(pval, &end, 10, &new_value) != 0 ||
222 		    *end != '\0' || new_value > 1) {
223 			return (EINVAL);
224 		}
225 	}
226 	if (!pinfo->prop_cur_bval && new_value) {
227 		cmn_err(CE_NOTE, "IP: enabling CGTP filtering%s",
228 		    ipst->ips_ip_cgtp_filter_ops == NULL ?
229 		    " (module not loaded)" : "");
230 	}
231 	if (pinfo->prop_cur_bval && !new_value) {
232 		cmn_err(CE_NOTE, "IP: disabling CGTP filtering%s",
233 		    ipst->ips_ip_cgtp_filter_ops == NULL ?
234 		    " (module not loaded)" : "");
235 	}
236 	if (ipst->ips_ip_cgtp_filter_ops != NULL) {
237 		int	res;
238 		netstackid_t stackid = ipst->ips_netstack->netstack_stackid;
239 
240 		res = ipst->ips_ip_cgtp_filter_ops->cfo_change_state(stackid,
241 		    new_value);
242 		if (res)
243 			return (res);
244 	}
245 	pinfo->prop_cur_bval = (new_value == 1 ? B_TRUE : B_FALSE);
246 	ill_set_inputfn_all(ipst);
247 	return (0);
248 }
249 
250 /*
251  * Retrieve the default MTU or min-max MTU range for a given interface.
252  *
253  *  -- ill_max_frag value tells us the maximum MTU that can be handled by the
254  *     datalink. This value is advertised by the driver via DLPI messages
255  *     (DL_NOTE_SDU_SIZE/DL_INFO_ACK).
256  *
257  *  -- ill_current_frag for the most link-types will be same as ill_max_frag
258  *     to begin with. However it is dynamically computed for some link-types
259  *     like tunnels, based on the tunnel PMTU.
260  *
261  *  -- ill_mtu is the user set MTU using SIOCSLIFMTU and must lie between
262  *     (IPV6_MIN_MTU/IP_MIN_MTU) and ill_max_frag.
263  *
264  *  -- ill_user_mtu is set by in.ndpd using SIOCSLIFLNKINFO and must lie between
265  *     (IPV6_MIN_MTU/IP_MIN_MTU) and ill_max_frag.
266  */
267 int
268 ip_get_mtu(void *cbarg, mod_prop_info_t *pinfo, const char *ifname,
269     void *pval, uint_t psize, uint_t flags)
270 {
271 	ill_walk_context_t 	ctx;
272 	ill_t 			*ill;
273 	ip_stack_t 		*ipst =  (ip_stack_t *)cbarg;
274 	boolean_t		isv6;
275 	uint32_t		max_mtu, def_mtu;
276 	size_t			nbytes = 0;
277 
278 	if (!(flags & (MOD_PROP_DEFAULT|MOD_PROP_POSSIBLE)))
279 		return (ENOTSUP);
280 
281 	if (ifname == NULL || ifname[0] == '\0')
282 		return (ENOTSUP);
283 
284 	isv6 = (pinfo->mpi_proto == MOD_PROTO_IPV6 ? B_TRUE : B_FALSE);
285 	rw_enter(&ipst->ips_ill_g_lock, RW_READER);
286 	if (isv6)
287 		ill = ILL_START_WALK_V6(&ctx, ipst);
288 	else
289 		ill = ILL_START_WALK_V4(&ctx, ipst);
290 	for (; ill != NULL; ill = ill_next(&ctx, ill)) {
291 		if (strcmp(ifname, ill->ill_name) == 0)
292 			break;
293 	}
294 	if (ill == NULL) {
295 		rw_exit(&ipst->ips_ill_g_lock);
296 		return (ENXIO);
297 	}
298 	max_mtu = ill->ill_max_frag;
299 	def_mtu = ill->ill_current_frag;
300 	rw_exit(&ipst->ips_ill_g_lock);
301 
302 	if (flags & MOD_PROP_DEFAULT) {
303 		nbytes = snprintf(pval, psize, "%u", def_mtu);
304 	} else if (flags & MOD_PROP_POSSIBLE) {
305 		uint32_t	min_mtu;
306 
307 		min_mtu = isv6 ? IPV6_MIN_MTU : IP_MIN_MTU;
308 		nbytes = snprintf(pval, psize, "%u-%u", min_mtu, max_mtu);
309 	} else {
310 		return (ENOTSUP);
311 	}
312 
313 	if (nbytes >= psize)
314 		return (ENOBUFS);
315 	return (0);
316 }
317 
318 /*
319  * See the comments for ip[6]_strict_src_multihoming for an explanation
320  * of the semanitcs.
321  */
322 void
323 ip_set_src_multihoming_common(ulong_t new_value, ulong_t old_value,
324     boolean_t isv6, ip_stack_t *ipst)
325 {
326 	if (isv6)
327 		ipst->ips_ipv6_strict_src_multihoming = new_value;
328 	else
329 		ipst->ips_ip_strict_src_multihoming = new_value;
330 	if (new_value != old_value) {
331 		if (!isv6) {
332 			if (old_value == 0) {
333 				ire_walk_v4(ip_ire_rebind_walker, NULL,
334 				    ALL_ZONES, ipst);
335 			} else if (new_value == 0) {
336 				ire_walk_v4(ip_ire_unbind_walker, NULL,
337 				    ALL_ZONES, ipst);
338 			}
339 			ipcl_walk(conn_ire_revalidate, (void *)B_FALSE, ipst);
340 		} else {
341 			if (old_value == 0) {
342 				ire_walk_v6(ip_ire_rebind_walker, NULL,
343 				    ALL_ZONES, ipst);
344 			} else if (new_value == 0) {
345 				ire_walk_v6(ip_ire_unbind_walker, NULL,
346 				    ALL_ZONES, ipst);
347 			}
348 			ipcl_walk(conn_ire_revalidate, (void *)B_TRUE, ipst);
349 		}
350 	}
351 }
352 
353 /* ARGSUSED */
354 static int
355 ip_set_src_multihoming(void *cbarg, cred_t *cr, mod_prop_info_t *pinfo,
356     const char *ifname, const void* pval, uint_t flags)
357 {
358 	unsigned long 	new_value, old_value;
359 	boolean_t	isv6;
360 	ip_stack_t	*ipst = (ip_stack_t *)cbarg;
361 	int		err;
362 
363 	old_value = pinfo->prop_cur_uval;
364 
365 	if ((err = mod_uint32_value(pval, pinfo, flags, &new_value)) != 0)
366 		return (err);
367 	pinfo->prop_cur_uval = new_value;
368 	isv6 = (strcmp(pinfo->mpi_name, "ip6_strict_src_multihoming") == 0);
369 	ip_set_src_multihoming_common(new_value, old_value, isv6, ipst);
370 	return (0);
371 }
372 
373 
374 /* ARGSUSED */
375 static int
376 ip_set_hostmodel(void *cbarg, cred_t *cr, mod_prop_info_t *pinfo,
377     const char *ifname, const void* pval, uint_t flags)
378 {
379 	ip_hostmodel_t	new_value, old_value;
380 	ip_stack_t	*ipst = (ip_stack_t *)cbarg;
381 	uint32_t	old_src_multihoming;
382 	int		err;
383 	ulong_t		tmp;
384 	boolean_t	isv6;
385 
386 	old_value = pinfo->prop_cur_uval;
387 
388 	if ((err = mod_uint32_value(pval, pinfo, flags, &tmp)) != 0)
389 		return (err);
390 	new_value = tmp;
391 	pinfo->prop_cur_uval = new_value;
392 
393 	switch (old_value) {
394 	case IP_WEAK_ES:
395 		old_src_multihoming = 0;
396 		break;
397 	case IP_SRC_PRI_ES:
398 		old_src_multihoming = 1;
399 		break;
400 	case IP_STRONG_ES:
401 		old_src_multihoming = 2;
402 		break;
403 	default:
404 		ASSERT(0);
405 		old_src_multihoming = IP_MAXVAL_ES;
406 		break;
407 	}
408 	/*
409 	 * Changes to src_multihoming may require ire's to be rebound/unbound,
410 	 * and also require generation number resets. Changes to dst_multihoming
411 	 * require a simple reset of the value.
412 	 */
413 	isv6 = (pinfo->mpi_proto == MOD_PROTO_IPV6);
414 	if (new_value != old_value) {
415 		switch (new_value) {
416 		case IP_WEAK_ES:
417 			ip_set_src_multihoming_common(0, old_src_multihoming,
418 			    isv6, ipst);
419 			if (isv6)
420 				ipst->ips_ipv6_strict_dst_multihoming = 0;
421 			else
422 				ipst->ips_ip_strict_dst_multihoming = 0;
423 			break;
424 		case IP_SRC_PRI_ES:
425 			ip_set_src_multihoming_common(1, old_src_multihoming,
426 			    isv6, ipst);
427 			if (isv6)
428 				ipst->ips_ipv6_strict_dst_multihoming = 0;
429 			else
430 				ipst->ips_ip_strict_dst_multihoming = 0;
431 			break;
432 		case IP_STRONG_ES:
433 			ip_set_src_multihoming_common(2, old_src_multihoming,
434 			    isv6, ipst);
435 			if (isv6)
436 				ipst->ips_ipv6_strict_dst_multihoming = 1;
437 			else
438 				ipst->ips_ip_strict_dst_multihoming = 1;
439 			break;
440 		default:
441 			return (EINVAL);
442 		}
443 	}
444 	return (0);
445 }
446 
447 /* ARGSUSED */
448 int
449 ip_get_hostmodel(void *cbarg, mod_prop_info_t *pinfo, const char *ifname,
450     void *pval, uint_t psize, uint_t flags)
451 {
452 	boolean_t	isv6 = (pinfo->mpi_proto == MOD_PROTO_IPV6);
453 	ip_stack_t	*ipst = cbarg;
454 	ip_hostmodel_t	hostmodel;
455 
456 	if (psize < sizeof (hostmodel))
457 		return (ENOBUFS);
458 	bzero(pval, psize);
459 	if (!isv6) {
460 		if (ipst->ips_ip_strict_src_multihoming == 0 &&
461 		    ipst->ips_ip_strict_dst_multihoming == 0)
462 			hostmodel = IP_WEAK_ES;
463 		else if (ipst->ips_ip_strict_src_multihoming == 1 &&
464 		    ipst->ips_ip_strict_dst_multihoming == 0)
465 			hostmodel = IP_SRC_PRI_ES;
466 		else if (ipst->ips_ip_strict_src_multihoming == 2 &&
467 		    ipst->ips_ip_strict_dst_multihoming == 1)
468 			hostmodel = IP_STRONG_ES;
469 		else
470 			hostmodel = IP_MAXVAL_ES;
471 	} else {
472 		if (ipst->ips_ipv6_strict_src_multihoming == 0 &&
473 		    ipst->ips_ipv6_strict_dst_multihoming == 0)
474 			hostmodel = IP_WEAK_ES;
475 		else if (ipst->ips_ipv6_strict_src_multihoming == 1 &&
476 		    ipst->ips_ipv6_strict_dst_multihoming == 0)
477 			hostmodel = IP_SRC_PRI_ES;
478 		else if (ipst->ips_ipv6_strict_src_multihoming == 2 &&
479 		    ipst->ips_ipv6_strict_dst_multihoming == 1)
480 			hostmodel = IP_STRONG_ES;
481 		else
482 			hostmodel = IP_MAXVAL_ES;
483 	}
484 	bcopy(&hostmodel, pval, sizeof (hostmodel));
485 	return (0);
486 }
487 
488 /*
489  * All of these are alterable, within the min/max values given, at run time.
490  *
491  * Note: All those tunables which do not start with "_" are Committed and
492  * therefore are public. See PSARC 2010/080.
493  */
494 mod_prop_info_t ip_propinfo_tbl[] = {
495 	/* tunable - 0 */
496 	{ "_respond_to_address_mask_broadcast", MOD_PROTO_IP,
497 	    mod_set_boolean, mod_get_boolean,
498 	    {B_FALSE}, {B_FALSE} },
499 
500 	{ "_respond_to_echo_broadcast", MOD_PROTO_IP,
501 	    mod_set_boolean, mod_get_boolean,
502 	    {B_TRUE},  {B_TRUE} },
503 
504 	{ "_respond_to_echo_multicast", MOD_PROTO_IPV4,
505 	    mod_set_boolean, mod_get_boolean,
506 	    {B_TRUE}, {B_TRUE} },
507 
508 	{ "_respond_to_timestamp", MOD_PROTO_IP,
509 	    mod_set_boolean, mod_get_boolean,
510 	    {B_FALSE}, {B_FALSE} },
511 
512 	{ "_respond_to_timestamp_broadcast", MOD_PROTO_IP,
513 	    mod_set_boolean, mod_get_boolean,
514 	    {B_FALSE}, {B_FALSE} },
515 
516 	{ "_send_redirects", MOD_PROTO_IPV4,
517 	    mod_set_boolean, mod_get_boolean,
518 	    {B_TRUE}, {B_TRUE} },
519 
520 	{ "_forward_directed_broadcasts", MOD_PROTO_IP,
521 	    mod_set_boolean, mod_get_boolean,
522 	    {B_FALSE}, {B_FALSE} },
523 
524 	{ "_mrtdebug", MOD_PROTO_IP,
525 	    mod_set_uint32, mod_get_uint32,
526 	    {0, 10, 0}, {0} },
527 
528 	{ "_ire_reclaim_fraction", MOD_PROTO_IP,
529 	    mod_set_uint32, mod_get_uint32,
530 	    {1, 8, 3}, {3} },
531 
532 	{ "_nce_reclaim_fraction", MOD_PROTO_IP,
533 	    mod_set_uint32, mod_get_uint32,
534 	    {1, 8, 3}, {3} },
535 
536 	/* tunable - 10 */
537 	{ "_dce_reclaim_fraction", MOD_PROTO_IP,
538 	    mod_set_uint32, mod_get_uint32,
539 	    {1, 8, 3}, {3} },
540 
541 	{ "ttl", MOD_PROTO_IPV4,
542 	    mod_set_uint32, mod_get_uint32,
543 	    {1, 255, 255}, {255} },
544 
545 	{ "_forward_src_routed", MOD_PROTO_IPV4,
546 	    mod_set_boolean, mod_get_boolean,
547 	    {B_FALSE}, {B_FALSE} },
548 
549 	{ "_wroff_extra", MOD_PROTO_IP,
550 	    mod_set_uint32, mod_get_uint32,
551 	    {0, 256, 32}, {32} },
552 
553 	/* following tunable is in seconds - a deviant! */
554 	{ "_pathmtu_interval", MOD_PROTO_IP,
555 	    mod_set_uint32, mod_get_uint32,
556 	    {2, 999999999, 60*20}, {60*20} },
557 
558 	{ "_icmp_return_data_bytes", MOD_PROTO_IPV4,
559 	    mod_set_uint32, mod_get_uint32,
560 	    {8, 65536, 64}, {64} },
561 
562 	{ "_path_mtu_discovery", MOD_PROTO_IP,
563 	    mod_set_boolean, mod_get_boolean,
564 	    {B_TRUE}, {B_TRUE} },
565 
566 	{ "_pmtu_min", MOD_PROTO_IP,
567 	    mod_set_uint32, mod_get_uint32,
568 	    {68, 65535, 576}, {576} },
569 
570 	{ "_ignore_redirect", MOD_PROTO_IPV4,
571 	    mod_set_boolean, mod_get_boolean,
572 	    {B_FALSE}, {B_FALSE} },
573 
574 	{ "_arp_icmp_error", MOD_PROTO_IP,
575 	    mod_set_boolean, mod_get_boolean,
576 	    {B_FALSE}, {B_FALSE} },
577 
578 	/* tunable - 20 */
579 	{ "_broadcast_ttl", MOD_PROTO_IP,
580 	    mod_set_uint32, mod_get_uint32,
581 	    {1, 254, 1}, {1} },
582 
583 	{ "_icmp_err_interval", MOD_PROTO_IP,
584 	    mod_set_uint32, mod_get_uint32,
585 	    {0, 99999, 100}, {100} },
586 
587 	{ "_icmp_err_burst", MOD_PROTO_IP,
588 	    mod_set_uint32, mod_get_uint32,
589 	    {1, 99999, 10}, {10} },
590 
591 	{ "_reass_queue_bytes", MOD_PROTO_IP,
592 	    mod_set_uint32, mod_get_uint32,
593 	    {0, 999999999, 1000000}, {1000000} },
594 
595 	/*
596 	 * See comments for ip_strict_src_multihoming for an explanation
597 	 * of the semantics of ip_strict_dst_multihoming
598 	 */
599 	{ "_strict_dst_multihoming", MOD_PROTO_IPV4,
600 	    mod_set_uint32, mod_get_uint32,
601 	    {0, 1, 0}, {0} },
602 
603 	{ "_addrs_per_if", MOD_PROTO_IP,
604 	    mod_set_uint32, mod_get_uint32,
605 	    {1, MAX_ADDRS_PER_IF, 256}, {256} },
606 
607 	{ "_ipsec_override_persocket_policy", MOD_PROTO_IP,
608 	    mod_set_boolean, mod_get_boolean,
609 	    {B_FALSE}, {B_FALSE} },
610 
611 	{ "_icmp_accept_clear_messages", MOD_PROTO_IP,
612 	    mod_set_boolean, mod_get_boolean,
613 	    {B_TRUE}, {B_TRUE} },
614 
615 	{ "_igmp_accept_clear_messages", MOD_PROTO_IP,
616 	    mod_set_boolean, mod_get_boolean,
617 	    {B_TRUE}, {B_TRUE} },
618 
619 	{ "_ndp_delay_first_probe_time", MOD_PROTO_IP,
620 	    mod_set_uint32, mod_get_uint32,
621 	    {2, 999999999, ND_DELAY_FIRST_PROBE_TIME},
622 	    {ND_DELAY_FIRST_PROBE_TIME} },
623 
624 	/* tunable - 30 */
625 	{ "_ndp_max_unicast_solicit", MOD_PROTO_IP,
626 	    mod_set_uint32, mod_get_uint32,
627 	    {1, 999999999, ND_MAX_UNICAST_SOLICIT}, {ND_MAX_UNICAST_SOLICIT} },
628 
629 	{ "hoplimit", MOD_PROTO_IPV6,
630 	    mod_set_uint32, mod_get_uint32,
631 	    {1, 255, IPV6_MAX_HOPS}, {IPV6_MAX_HOPS} },
632 
633 	{ "_icmp_return_data_bytes", MOD_PROTO_IPV6,
634 	    mod_set_uint32, mod_get_uint32,
635 	    {8, IPV6_MIN_MTU, IPV6_MIN_MTU}, {IPV6_MIN_MTU} },
636 
637 	{ "_forward_src_routed", MOD_PROTO_IPV6,
638 	    mod_set_boolean, mod_get_boolean,
639 	    {B_FALSE}, {B_FALSE} },
640 
641 	{ "_respond_to_echo_multicast", MOD_PROTO_IPV6,
642 	    mod_set_boolean, mod_get_boolean,
643 	    {B_TRUE}, {B_TRUE} },
644 
645 	{ "_send_redirects", MOD_PROTO_IPV6,
646 	    mod_set_boolean, mod_get_boolean,
647 	    {B_TRUE}, {B_TRUE} },
648 
649 	{ "_ignore_redirect", MOD_PROTO_IPV6,
650 	    mod_set_boolean, mod_get_boolean,
651 	    {B_FALSE}, {B_FALSE} },
652 
653 	/*
654 	 * See comments for ip6_strict_src_multihoming for an explanation
655 	 * of the semantics of ip6_strict_dst_multihoming
656 	 */
657 	{ "_strict_dst_multihoming", MOD_PROTO_IPV6,
658 	    mod_set_uint32, mod_get_uint32,
659 	    {0, 1, 0}, {0} },
660 
661 	{ "_src_check", MOD_PROTO_IP,
662 	    mod_set_uint32, mod_get_uint32,
663 	    {0, 2, 2}, {2} },
664 
665 	{ "_ipsec_policy_log_interval", MOD_PROTO_IP,
666 	    mod_set_uint32, mod_get_uint32,
667 	    {0, 999999, 1000}, {1000} },
668 
669 	/* tunable - 40 */
670 	{ "_pim_accept_clear_messages", MOD_PROTO_IP,
671 	    mod_set_boolean, mod_get_boolean,
672 	    {B_TRUE}, {B_TRUE} },
673 
674 	{ "_ndp_unsolicit_interval", MOD_PROTO_IP,
675 	    mod_set_uint32, mod_get_uint32,
676 	    {1000, 20000, 2000}, {2000} },
677 
678 	{ "_ndp_unsolicit_count", MOD_PROTO_IP,
679 	    mod_set_uint32, mod_get_uint32,
680 	    {1, 20, 3}, {3} },
681 
682 	{ "_ignore_home_address_opt", MOD_PROTO_IPV6,
683 	    mod_set_boolean, mod_get_boolean,
684 	    {B_TRUE}, {B_TRUE} },
685 
686 	{ "_policy_mask", MOD_PROTO_IP,
687 	    mod_set_uint32, mod_get_uint32,
688 	    {0, 15, 0}, {0} },
689 
690 	{ "_ecmp_behavior", MOD_PROTO_IP,
691 	    mod_set_uint32, mod_get_uint32,
692 	    {0, 2, 2}, {2} },
693 
694 	{ "_multirt_ttl", MOD_PROTO_IP,
695 	    mod_set_uint32, mod_get_uint32,
696 	    {0, 255, 1}, {1} },
697 
698 	/* following tunable is in seconds - a deviant */
699 	{ "_ire_badcnt_lifetime", MOD_PROTO_IP,
700 	    mod_set_uint32, mod_get_uint32,
701 	    {0, 3600, 60}, {60} },
702 
703 	{ "_max_temp_idle", MOD_PROTO_IP,
704 	    mod_set_uint32, mod_get_uint32,
705 	    {0, 999999, 60*60*24}, {60*60*24} },
706 
707 	{ "_max_temp_defend", MOD_PROTO_IP,
708 	    mod_set_uint32, mod_get_uint32,
709 	    {0, 1000, 1}, {1} },
710 
711 	/* tunable - 50 */
712 	/*
713 	 * when a conflict of an active address is detected,
714 	 * defend up to ip_max_defend times, within any
715 	 * ip_defend_interval span.
716 	 */
717 	{ "_max_defend", MOD_PROTO_IP,
718 	    mod_set_uint32, mod_get_uint32,
719 	    {0, 1000, 3}, {3} },
720 
721 	{ "_defend_interval", MOD_PROTO_IP,
722 	    mod_set_uint32, mod_get_uint32,
723 	    {0, 999999, 30}, {30} },
724 
725 	{ "_dup_recovery", MOD_PROTO_IP,
726 	    mod_set_uint32, mod_get_uint32,
727 	    {0, 3600000, 300000}, {300000} },
728 
729 	{ "_restrict_interzone_loopback", MOD_PROTO_IP,
730 	    mod_set_boolean, mod_get_boolean,
731 	    {B_TRUE}, {B_TRUE} },
732 
733 	{ "_lso_outbound", MOD_PROTO_IP,
734 	    mod_set_boolean, mod_get_boolean,
735 	    {B_TRUE}, {B_TRUE} },
736 
737 	{ "_igmp_max_version", MOD_PROTO_IP,
738 	    mod_set_uint32, mod_get_uint32,
739 	    {IGMP_V1_ROUTER, IGMP_V3_ROUTER, IGMP_V3_ROUTER},
740 	    {IGMP_V3_ROUTER} },
741 
742 	{ "_mld_max_version", MOD_PROTO_IP,
743 	    mod_set_uint32, mod_get_uint32,
744 	    {MLD_V1_ROUTER, MLD_V2_ROUTER, MLD_V2_ROUTER}, {MLD_V2_ROUTER} },
745 
746 	{ "forwarding", MOD_PROTO_IPV4,
747 	    ip_set_forwarding, ip_get_forwarding,
748 	    {IP_FORWARD_NEVER}, {IP_FORWARD_NEVER} },
749 
750 	{ "forwarding", MOD_PROTO_IPV6,
751 	    ip_set_forwarding, ip_get_forwarding,
752 	    {IP_FORWARD_NEVER}, {IP_FORWARD_NEVER} },
753 
754 	{ "_reasm_timeout", MOD_PROTO_IPV4,
755 	    mod_set_uint32, mod_get_uint32,
756 	    {5, 255, IP_REASM_TIMEOUT},
757 	    {IP_REASM_TIMEOUT} },
758 
759 	/* tunable - 60 */
760 	{ "_reasm_timeout", MOD_PROTO_IPV6,
761 	    mod_set_uint32, mod_get_uint32,
762 	    {5, 255, IPV6_REASM_TIMEOUT},
763 	    {IPV6_REASM_TIMEOUT} },
764 
765 	{ "_cgtp_filter", MOD_PROTO_IP,
766 	    ip_set_cgtp_filter, mod_get_boolean,
767 	    {B_FALSE}, {B_FALSE} },
768 
769 	/* delay before sending first probe: */
770 	{ "_arp_probe_delay", MOD_PROTO_IP,
771 	    mod_set_uint32, mod_get_uint32,
772 	    {0, 20000, 1000}, {1000} },
773 
774 	{ "_arp_fastprobe_delay", MOD_PROTO_IP,
775 	    mod_set_uint32, mod_get_uint32,
776 	    {0, 20000, 100}, {100} },
777 
778 	/* interval at which DAD probes are sent: */
779 	{ "_arp_probe_interval", MOD_PROTO_IP,
780 	    mod_set_uint32, mod_get_uint32,
781 	    {10, 20000, 1500}, {1500} },
782 
783 	{ "_arp_fastprobe_interval", MOD_PROTO_IP,
784 	    mod_set_uint32, mod_get_uint32,
785 	    {10, 20000, 150}, {150} },
786 
787 	{ "_arp_probe_count", MOD_PROTO_IP,
788 	    mod_set_uint32, mod_get_uint32,
789 	    {0, 20, 3}, {3} },
790 
791 	{ "_arp_fastprobe_count", MOD_PROTO_IP,
792 	    mod_set_uint32, mod_get_uint32,
793 	    {0, 20, 3}, {3} },
794 
795 	{ "_dad_announce_interval", MOD_PROTO_IPV4,
796 	    mod_set_uint32, mod_get_uint32,
797 	    {0, 3600000, 15000}, {15000} },
798 
799 	{ "_dad_announce_interval", MOD_PROTO_IPV6,
800 	    mod_set_uint32, mod_get_uint32,
801 	    {0, 3600000, 15000}, {15000} },
802 
803 	/* tunable - 70 */
804 	/*
805 	 * Rate limiting parameters for DAD defense used in
806 	 * ill_defend_rate_limit():
807 	 * defend_rate : pkts/hour permitted
808 	 * defend_interval : time that can elapse before we send out a
809 	 *			DAD defense.
810 	 * defend_period: denominator for defend_rate (in seconds).
811 	 */
812 	{ "_arp_defend_interval", MOD_PROTO_IP,
813 	    mod_set_uint32, mod_get_uint32,
814 	    {0, 3600000, 300000}, {300000} },
815 
816 	{ "_arp_defend_rate", MOD_PROTO_IP,
817 	    mod_set_uint32, mod_get_uint32,
818 	    {0, 20000, 100}, {100} },
819 
820 	{ "_ndp_defend_interval", MOD_PROTO_IP,
821 	    mod_set_uint32, mod_get_uint32,
822 	    {0, 3600000, 300000}, {300000} },
823 
824 	{ "_ndp_defend_rate", MOD_PROTO_IP,
825 	    mod_set_uint32, mod_get_uint32,
826 	    {0, 20000, 100}, {100} },
827 
828 	{ "_arp_defend_period", MOD_PROTO_IP,
829 	    mod_set_uint32, mod_get_uint32,
830 	    {5, 86400, 3600}, {3600} },
831 
832 	{ "_ndp_defend_period", MOD_PROTO_IP,
833 	    mod_set_uint32, mod_get_uint32,
834 	    {5, 86400, 3600}, {3600} },
835 
836 	{ "_icmp_return_pmtu", MOD_PROTO_IPV4,
837 	    mod_set_boolean, mod_get_boolean,
838 	    {B_TRUE}, {B_TRUE} },
839 
840 	{ "_icmp_return_pmtu", MOD_PROTO_IPV6,
841 	    mod_set_boolean, mod_get_boolean,
842 	    {B_TRUE}, {B_TRUE} },
843 
844 	/*
845 	 * publish count/interval values used to announce local addresses
846 	 * for IPv4, IPv6.
847 	 */
848 	{ "_arp_publish_count", MOD_PROTO_IP,
849 	    mod_set_uint32, mod_get_uint32,
850 	    {1, 20, 5}, {5} },
851 
852 	{ "_arp_publish_interval", MOD_PROTO_IP,
853 	    mod_set_uint32, mod_get_uint32,
854 	    {1000, 20000, 2000}, {2000} },
855 
856 	/* tunable - 80 */
857 	/*
858 	 * The ip*strict_src_multihoming and ip*strict_dst_multihoming provide
859 	 * a range of choices for setting strong/weak/preferred end-system
860 	 * behavior. The semantics for setting these are:
861 	 *
862 	 * ip*_strict_dst_multihoming = 0
863 	 *    weak end system model for managing ip destination addresses.
864 	 *    A packet with IP dst D1 that's received on interface I1 will be
865 	 *    accepted as long as D1 is one of the local addresses on
866 	 *    the machine, even if D1 is not configured on I1.
867 	 * ip*strict_dst_multihioming = 1
868 	 *    strong end system model for managing ip destination addresses.
869 	 *    A packet with IP dst D1 that's received on interface I1 will be
870 	 *    accepted if, and only if, D1 is configured on I1.
871 	 *
872 	 * ip*strict_src_multihoming = 0
873 	 *    Source agnostic route selection for outgoing packets: the
874 	 *    outgoing interface for a packet will be computed using
875 	 *    default algorithms for route selection, where the route
876 	 *    with the longest matching prefix is chosen for the output
877 	 *    unless other route selection constraints are explicitly
878 	 *    specified during routing table lookup.  This may result
879 	 *    in packet being sent out on interface I2 with source
880 	 *    address S1, even though S1 is not a configured address on I2.
881 	 * ip*strict_src_multihoming = 1
882 	 *    Preferred source aware route selection for outgoing packets: for
883 	 *    a packet with source S2, destination D2, the route selection
884 	 *    algorithm will first attempt to find a route for the destination
885 	 *    that goes out through an interface where S2 is
886 	 *    configured. If such a route cannot be found, then the
887 	 *    best-matching route for D2 will be selected.
888 	 * ip*strict_src_multihoming = 2
889 	 *    Source aware route selection for outgoing packets: a packet will
890 	 *    be sent out on an interface I2 only if the src address S2 of the
891 	 *    packet is a configured address on I2. In conjunction with
892 	 *    the setting 'ip_strict_dst_multihoming == 1', this will result in
893 	 *    the implementation of Strong ES as defined in Section 3.3.4.2 of
894 	 *    RFC 1122
895 	 */
896 	{ "_strict_src_multihoming", MOD_PROTO_IPV4,
897 	    ip_set_src_multihoming, mod_get_uint32,
898 	    {0, 2, 0}, {0} },
899 
900 	{ "_strict_src_multihoming", MOD_PROTO_IPV6,
901 	    ip_set_src_multihoming, mod_get_uint32,
902 	    {0, 2, 0}, {0} },
903 
904 #ifdef DEBUG
905 	{ "_drop_inbound_icmpv6", MOD_PROTO_IPV6,
906 	    mod_set_boolean, mod_get_boolean,
907 	    {B_FALSE}, {B_FALSE} },
908 #else
909 	{ "", 0, NULL, NULL, {0}, {0} },
910 #endif
911 	{ "mtu", MOD_PROTO_IPV4, NULL, ip_get_mtu, {0}, {0} },
912 
913 	{ "mtu", MOD_PROTO_IPV6, NULL, ip_get_mtu, {0}, {0} },
914 
915 	/*
916 	 * The following entry is a placeholder for `ip_debug' global
917 	 * variable. Within these callback functions, we will be
918 	 * setting/getting the global variable
919 	 */
920 	{ "_debug", MOD_PROTO_IP,
921 	    ip_set_debug, ip_get_debug,
922 	    {0, 20, 0}, {0} },
923 
924 	{ "hostmodel", MOD_PROTO_IPV4, ip_set_hostmodel, ip_get_hostmodel,
925 	    {IP_WEAK_ES, IP_STRONG_ES, IP_WEAK_ES}, {IP_WEAK_ES} },
926 
927 	{ "hostmodel", MOD_PROTO_IPV6, ip_set_hostmodel, ip_get_hostmodel,
928 	    {IP_WEAK_ES, IP_STRONG_ES, IP_WEAK_ES}, {IP_WEAK_ES} },
929 
930 	{ "?", MOD_PROTO_IP, NULL, mod_get_allprop, {0}, {0} },
931 
932 	{ NULL, 0, NULL, NULL, {0}, {0} }
933 };
934 
935 int ip_propinfo_count = A_CNT(ip_propinfo_tbl);
936