17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 5ee4701baSericheng * Common Development and Distribution License (the "License"). 6ee4701baSericheng * You may not use this file except in compliance with the License. 77c478bd9Sstevel@tonic-gate * 87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 117c478bd9Sstevel@tonic-gate * and limitations under the License. 127c478bd9Sstevel@tonic-gate * 137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 187c478bd9Sstevel@tonic-gate * 197c478bd9Sstevel@tonic-gate * CDDL HEADER END 207c478bd9Sstevel@tonic-gate */ 217c478bd9Sstevel@tonic-gate /* 2266cd0f60SKacheong Poon * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved. 237c478bd9Sstevel@tonic-gate */ 247c478bd9Sstevel@tonic-gate 257c478bd9Sstevel@tonic-gate /* 267c478bd9Sstevel@tonic-gate * IP PACKET CLASSIFIER 277c478bd9Sstevel@tonic-gate * 287c478bd9Sstevel@tonic-gate * The IP packet classifier provides mapping between IP packets and persistent 297c478bd9Sstevel@tonic-gate * connection state for connection-oriented protocols. It also provides 307c478bd9Sstevel@tonic-gate * interface for managing connection states. 317c478bd9Sstevel@tonic-gate * 327c478bd9Sstevel@tonic-gate * The connection state is kept in conn_t data structure and contains, among 337c478bd9Sstevel@tonic-gate * other things: 347c478bd9Sstevel@tonic-gate * 357c478bd9Sstevel@tonic-gate * o local/remote address and ports 367c478bd9Sstevel@tonic-gate * o Transport protocol 377c478bd9Sstevel@tonic-gate * o squeue for the connection (for TCP only) 387c478bd9Sstevel@tonic-gate * o reference counter 397c478bd9Sstevel@tonic-gate * o Connection state 407c478bd9Sstevel@tonic-gate * o hash table linkage 417c478bd9Sstevel@tonic-gate * o interface/ire information 427c478bd9Sstevel@tonic-gate * o credentials 437c478bd9Sstevel@tonic-gate * o ipsec policy 447c478bd9Sstevel@tonic-gate * o send and receive functions. 457c478bd9Sstevel@tonic-gate * o mutex lock. 467c478bd9Sstevel@tonic-gate * 477c478bd9Sstevel@tonic-gate * Connections use a reference counting scheme. They are freed when the 487c478bd9Sstevel@tonic-gate * reference counter drops to zero. A reference is incremented when connection 497c478bd9Sstevel@tonic-gate * is placed in a list or table, when incoming packet for the connection arrives 507c478bd9Sstevel@tonic-gate * and when connection is processed via squeue (squeue processing may be 517c478bd9Sstevel@tonic-gate * asynchronous and the reference protects the connection from being destroyed 527c478bd9Sstevel@tonic-gate * before its processing is finished). 537c478bd9Sstevel@tonic-gate * 54bd670b35SErik Nordmark * conn_recv is used to pass up packets to the ULP. 55bd670b35SErik Nordmark * For TCP conn_recv changes. It is tcp_input_listener_unbound initially for 56bd670b35SErik Nordmark * a listener, and changes to tcp_input_listener as the listener has picked a 57bd670b35SErik Nordmark * good squeue. For other cases it is set to tcp_input_data. 58bd670b35SErik Nordmark * 59bd670b35SErik Nordmark * conn_recvicmp is used to pass up ICMP errors to the ULP. 607c478bd9Sstevel@tonic-gate * 617c478bd9Sstevel@tonic-gate * Classifier uses several hash tables: 627c478bd9Sstevel@tonic-gate * 637c478bd9Sstevel@tonic-gate * ipcl_conn_fanout: contains all TCP connections in CONNECTED state 647c478bd9Sstevel@tonic-gate * ipcl_bind_fanout: contains all connections in BOUND state 657c478bd9Sstevel@tonic-gate * ipcl_proto_fanout: IPv4 protocol fanout 667c478bd9Sstevel@tonic-gate * ipcl_proto_fanout_v6: IPv6 protocol fanout 677c478bd9Sstevel@tonic-gate * ipcl_udp_fanout: contains all UDP connections 682b24ab6bSSebastien Roy * ipcl_iptun_fanout: contains all IP tunnel connections 697c478bd9Sstevel@tonic-gate * ipcl_globalhash_fanout: contains all connections 707c478bd9Sstevel@tonic-gate * 717c478bd9Sstevel@tonic-gate * The ipcl_globalhash_fanout is used for any walkers (like snmp and Clustering) 727c478bd9Sstevel@tonic-gate * which need to view all existing connections. 737c478bd9Sstevel@tonic-gate * 747c478bd9Sstevel@tonic-gate * All tables are protected by per-bucket locks. When both per-bucket lock and 757c478bd9Sstevel@tonic-gate * connection lock need to be held, the per-bucket lock should be acquired 767c478bd9Sstevel@tonic-gate * first, followed by the connection lock. 777c478bd9Sstevel@tonic-gate * 787c478bd9Sstevel@tonic-gate * All functions doing search in one of these tables increment a reference 797c478bd9Sstevel@tonic-gate * counter on the connection found (if any). This reference should be dropped 807c478bd9Sstevel@tonic-gate * when the caller has finished processing the connection. 817c478bd9Sstevel@tonic-gate * 827c478bd9Sstevel@tonic-gate * 837c478bd9Sstevel@tonic-gate * INTERFACES: 847c478bd9Sstevel@tonic-gate * =========== 857c478bd9Sstevel@tonic-gate * 867c478bd9Sstevel@tonic-gate * Connection Lookup: 877c478bd9Sstevel@tonic-gate * ------------------ 887c478bd9Sstevel@tonic-gate * 89bd670b35SErik Nordmark * conn_t *ipcl_classify_v4(mp, protocol, hdr_len, ira, ip_stack) 90bd670b35SErik Nordmark * conn_t *ipcl_classify_v6(mp, protocol, hdr_len, ira, ip_stack) 917c478bd9Sstevel@tonic-gate * 927c478bd9Sstevel@tonic-gate * Finds connection for an incoming IPv4 or IPv6 packet. Returns NULL if 937c478bd9Sstevel@tonic-gate * it can't find any associated connection. If the connection is found, its 947c478bd9Sstevel@tonic-gate * reference counter is incremented. 957c478bd9Sstevel@tonic-gate * 967c478bd9Sstevel@tonic-gate * mp: mblock, containing packet header. The full header should fit 977c478bd9Sstevel@tonic-gate * into a single mblock. It should also contain at least full IP 987c478bd9Sstevel@tonic-gate * and TCP or UDP header. 997c478bd9Sstevel@tonic-gate * 1007c478bd9Sstevel@tonic-gate * protocol: Either IPPROTO_TCP or IPPROTO_UDP. 1017c478bd9Sstevel@tonic-gate * 1027c478bd9Sstevel@tonic-gate * hdr_len: The size of IP header. It is used to find TCP or UDP header in 1037c478bd9Sstevel@tonic-gate * the packet. 1047c478bd9Sstevel@tonic-gate * 105bd670b35SErik Nordmark * ira->ira_zoneid: The zone in which the returned connection must be; the 106bd670b35SErik Nordmark * zoneid corresponding to the ire_zoneid on the IRE located for 107bd670b35SErik Nordmark * the packet's destination address. 108bd670b35SErik Nordmark * 109bd670b35SErik Nordmark * ira->ira_flags: Contains the IRAF_TX_MAC_EXEMPTABLE and 110bd670b35SErik Nordmark * IRAF_TX_SHARED_ADDR flags 1117c478bd9Sstevel@tonic-gate * 1127c478bd9Sstevel@tonic-gate * For TCP connections, the lookup order is as follows: 1137c478bd9Sstevel@tonic-gate * 5-tuple {src, dst, protocol, local port, remote port} 1147c478bd9Sstevel@tonic-gate * lookup in ipcl_conn_fanout table. 1157c478bd9Sstevel@tonic-gate * 3-tuple {dst, remote port, protocol} lookup in 1167c478bd9Sstevel@tonic-gate * ipcl_bind_fanout table. 1177c478bd9Sstevel@tonic-gate * 1187c478bd9Sstevel@tonic-gate * For UDP connections, a 5-tuple {src, dst, protocol, local port, 1197c478bd9Sstevel@tonic-gate * remote port} lookup is done on ipcl_udp_fanout. Note that, 1207c478bd9Sstevel@tonic-gate * these interfaces do not handle cases where a packets belongs 1217c478bd9Sstevel@tonic-gate * to multiple UDP clients, which is handled in IP itself. 1227c478bd9Sstevel@tonic-gate * 12345916cd2Sjpk * If the destination IRE is ALL_ZONES (indicated by zoneid), then we must 12445916cd2Sjpk * determine which actual zone gets the segment. This is used only in a 12545916cd2Sjpk * labeled environment. The matching rules are: 12645916cd2Sjpk * 12745916cd2Sjpk * - If it's not a multilevel port, then the label on the packet selects 12845916cd2Sjpk * the zone. Unlabeled packets are delivered to the global zone. 12945916cd2Sjpk * 13045916cd2Sjpk * - If it's a multilevel port, then only the zone registered to receive 13145916cd2Sjpk * packets on that port matches. 13245916cd2Sjpk * 13345916cd2Sjpk * Also, in a labeled environment, packet labels need to be checked. For fully 13445916cd2Sjpk * bound TCP connections, we can assume that the packet label was checked 13545916cd2Sjpk * during connection establishment, and doesn't need to be checked on each 13645916cd2Sjpk * packet. For others, though, we need to check for strict equality or, for 13745916cd2Sjpk * multilevel ports, membership in the range or set. This part currently does 13845916cd2Sjpk * a tnrh lookup on each packet, but could be optimized to use cached results 13945916cd2Sjpk * if that were necessary. (SCTP doesn't come through here, but if it did, 14045916cd2Sjpk * we would apply the same rules as TCP.) 14145916cd2Sjpk * 14245916cd2Sjpk * An implication of the above is that fully-bound TCP sockets must always use 14345916cd2Sjpk * distinct 4-tuples; they can't be discriminated by label alone. 14445916cd2Sjpk * 14545916cd2Sjpk * Note that we cannot trust labels on packets sent to fully-bound UDP sockets, 14645916cd2Sjpk * as there's no connection set-up handshake and no shared state. 14745916cd2Sjpk * 14845916cd2Sjpk * Labels on looped-back packets within a single zone do not need to be 14945916cd2Sjpk * checked, as all processes in the same zone have the same label. 15045916cd2Sjpk * 15145916cd2Sjpk * Finally, for unlabeled packets received by a labeled system, special rules 15245916cd2Sjpk * apply. We consider only the MLP if there is one. Otherwise, we prefer a 15345916cd2Sjpk * socket in the zone whose label matches the default label of the sender, if 15445916cd2Sjpk * any. In any event, the receiving socket must have SO_MAC_EXEMPT set and the 15545916cd2Sjpk * receiver's label must dominate the sender's default label. 15645916cd2Sjpk * 157bd670b35SErik Nordmark * conn_t *ipcl_tcp_lookup_reversed_ipv4(ipha_t *, tcpha_t *, int, ip_stack); 158f4b3ec61Sdh155122 * conn_t *ipcl_tcp_lookup_reversed_ipv6(ip6_t *, tcpha_t *, int, uint_t, 159f4b3ec61Sdh155122 * ip_stack); 1607c478bd9Sstevel@tonic-gate * 1617c478bd9Sstevel@tonic-gate * Lookup routine to find a exact match for {src, dst, local port, 1627c478bd9Sstevel@tonic-gate * remote port) for TCP connections in ipcl_conn_fanout. The address and 1637c478bd9Sstevel@tonic-gate * ports are read from the IP and TCP header respectively. 1647c478bd9Sstevel@tonic-gate * 165f4b3ec61Sdh155122 * conn_t *ipcl_lookup_listener_v4(lport, laddr, protocol, 166f4b3ec61Sdh155122 * zoneid, ip_stack); 167f4b3ec61Sdh155122 * conn_t *ipcl_lookup_listener_v6(lport, laddr, protocol, ifindex, 168f4b3ec61Sdh155122 * zoneid, ip_stack); 1697c478bd9Sstevel@tonic-gate * 1707c478bd9Sstevel@tonic-gate * Lookup routine to find a listener with the tuple {lport, laddr, 1717c478bd9Sstevel@tonic-gate * protocol} in the ipcl_bind_fanout table. For IPv6, an additional 1727c478bd9Sstevel@tonic-gate * parameter interface index is also compared. 1737c478bd9Sstevel@tonic-gate * 174f4b3ec61Sdh155122 * void ipcl_walk(func, arg, ip_stack) 1757c478bd9Sstevel@tonic-gate * 1767c478bd9Sstevel@tonic-gate * Apply 'func' to every connection available. The 'func' is called as 1777c478bd9Sstevel@tonic-gate * (*func)(connp, arg). The walk is non-atomic so connections may be 1787c478bd9Sstevel@tonic-gate * created and destroyed during the walk. The CONN_CONDEMNED and 1797c478bd9Sstevel@tonic-gate * CONN_INCIPIENT flags ensure that connections which are newly created 1807c478bd9Sstevel@tonic-gate * or being destroyed are not selected by the walker. 1817c478bd9Sstevel@tonic-gate * 1827c478bd9Sstevel@tonic-gate * Table Updates 1837c478bd9Sstevel@tonic-gate * ------------- 1847c478bd9Sstevel@tonic-gate * 185bd670b35SErik Nordmark * int ipcl_conn_insert(connp); 186bd670b35SErik Nordmark * int ipcl_conn_insert_v4(connp); 187bd670b35SErik Nordmark * int ipcl_conn_insert_v6(connp); 1887c478bd9Sstevel@tonic-gate * 1897c478bd9Sstevel@tonic-gate * Insert 'connp' in the ipcl_conn_fanout. 1907c478bd9Sstevel@tonic-gate * Arguements : 1917c478bd9Sstevel@tonic-gate * connp conn_t to be inserted 1927c478bd9Sstevel@tonic-gate * 1937c478bd9Sstevel@tonic-gate * Return value : 1947c478bd9Sstevel@tonic-gate * 0 if connp was inserted 1957c478bd9Sstevel@tonic-gate * EADDRINUSE if the connection with the same tuple 1967c478bd9Sstevel@tonic-gate * already exists. 1977c478bd9Sstevel@tonic-gate * 198bd670b35SErik Nordmark * int ipcl_bind_insert(connp); 199bd670b35SErik Nordmark * int ipcl_bind_insert_v4(connp); 200bd670b35SErik Nordmark * int ipcl_bind_insert_v6(connp); 2017c478bd9Sstevel@tonic-gate * 2027c478bd9Sstevel@tonic-gate * Insert 'connp' in ipcl_bind_fanout. 2037c478bd9Sstevel@tonic-gate * Arguements : 2047c478bd9Sstevel@tonic-gate * connp conn_t to be inserted 2057c478bd9Sstevel@tonic-gate * 2067c478bd9Sstevel@tonic-gate * 2077c478bd9Sstevel@tonic-gate * void ipcl_hash_remove(connp); 2087c478bd9Sstevel@tonic-gate * 2097c478bd9Sstevel@tonic-gate * Removes the 'connp' from the connection fanout table. 2107c478bd9Sstevel@tonic-gate * 2117c478bd9Sstevel@tonic-gate * Connection Creation/Destruction 2127c478bd9Sstevel@tonic-gate * ------------------------------- 2137c478bd9Sstevel@tonic-gate * 214f4b3ec61Sdh155122 * conn_t *ipcl_conn_create(type, sleep, netstack_t *) 2157c478bd9Sstevel@tonic-gate * 2167c478bd9Sstevel@tonic-gate * Creates a new conn based on the type flag, inserts it into 2177c478bd9Sstevel@tonic-gate * globalhash table. 2187c478bd9Sstevel@tonic-gate * 2197c478bd9Sstevel@tonic-gate * type: This flag determines the type of conn_t which needs to be 220fc80c0dfSnordmark * created i.e., which kmem_cache it comes from. 2217c478bd9Sstevel@tonic-gate * IPCL_TCPCONN indicates a TCP connection 222fc80c0dfSnordmark * IPCL_SCTPCONN indicates a SCTP connection 223fc80c0dfSnordmark * IPCL_UDPCONN indicates a UDP conn_t. 224fc80c0dfSnordmark * IPCL_RAWIPCONN indicates a RAWIP/ICMP conn_t. 225fc80c0dfSnordmark * IPCL_RTSCONN indicates a RTS conn_t. 226fc80c0dfSnordmark * IPCL_IPCCONN indicates all other connections. 2277c478bd9Sstevel@tonic-gate * 2287c478bd9Sstevel@tonic-gate * void ipcl_conn_destroy(connp) 2297c478bd9Sstevel@tonic-gate * 2307c478bd9Sstevel@tonic-gate * Destroys the connection state, removes it from the global 2317c478bd9Sstevel@tonic-gate * connection hash table and frees its memory. 2327c478bd9Sstevel@tonic-gate */ 2337c478bd9Sstevel@tonic-gate 2347c478bd9Sstevel@tonic-gate #include <sys/types.h> 2357c478bd9Sstevel@tonic-gate #include <sys/stream.h> 2367c478bd9Sstevel@tonic-gate #include <sys/stropts.h> 2377c478bd9Sstevel@tonic-gate #include <sys/sysmacros.h> 2387c478bd9Sstevel@tonic-gate #include <sys/strsubr.h> 2397c478bd9Sstevel@tonic-gate #include <sys/strsun.h> 2407c478bd9Sstevel@tonic-gate #define _SUN_TPI_VERSION 2 2417c478bd9Sstevel@tonic-gate #include <sys/ddi.h> 2427c478bd9Sstevel@tonic-gate #include <sys/cmn_err.h> 2437c478bd9Sstevel@tonic-gate #include <sys/debug.h> 2447c478bd9Sstevel@tonic-gate 2457c478bd9Sstevel@tonic-gate #include <sys/systm.h> 2467c478bd9Sstevel@tonic-gate #include <sys/param.h> 2477c478bd9Sstevel@tonic-gate #include <sys/kmem.h> 2487c478bd9Sstevel@tonic-gate #include <sys/isa_defs.h> 2497c478bd9Sstevel@tonic-gate #include <inet/common.h> 2507c478bd9Sstevel@tonic-gate #include <netinet/ip6.h> 2517c478bd9Sstevel@tonic-gate #include <netinet/icmp6.h> 2527c478bd9Sstevel@tonic-gate 2537c478bd9Sstevel@tonic-gate #include <inet/ip.h> 254bd670b35SErik Nordmark #include <inet/ip_if.h> 255bd670b35SErik Nordmark #include <inet/ip_ire.h> 2567c478bd9Sstevel@tonic-gate #include <inet/ip6.h> 2577c478bd9Sstevel@tonic-gate #include <inet/ip_ndp.h> 2580f1702c5SYu Xiangning #include <inet/ip_impl.h> 259ff550d0eSmasputra #include <inet/udp_impl.h> 2607c478bd9Sstevel@tonic-gate #include <inet/sctp_ip.h> 261f4b3ec61Sdh155122 #include <inet/sctp/sctp_impl.h> 262fc80c0dfSnordmark #include <inet/rawip_impl.h> 263fc80c0dfSnordmark #include <inet/rts_impl.h> 2642b24ab6bSSebastien Roy #include <inet/iptun/iptun_impl.h> 2657c478bd9Sstevel@tonic-gate 2667c478bd9Sstevel@tonic-gate #include <sys/cpuvar.h> 2677c478bd9Sstevel@tonic-gate 2687c478bd9Sstevel@tonic-gate #include <inet/ipclassifier.h> 2690f1702c5SYu Xiangning #include <inet/tcp.h> 2707c478bd9Sstevel@tonic-gate #include <inet/ipsec_impl.h> 2717c478bd9Sstevel@tonic-gate 27245916cd2Sjpk #include <sys/tsol/tnet.h> 2730f1702c5SYu Xiangning #include <sys/sockio.h> 27445916cd2Sjpk 275f4b3ec61Sdh155122 /* Old value for compatibility. Setable in /etc/system */ 2767c478bd9Sstevel@tonic-gate uint_t tcp_conn_hash_size = 0; 2777c478bd9Sstevel@tonic-gate 278f4b3ec61Sdh155122 /* New value. Zero means choose automatically. Setable in /etc/system */ 2797c478bd9Sstevel@tonic-gate uint_t ipcl_conn_hash_size = 0; 2807c478bd9Sstevel@tonic-gate uint_t ipcl_conn_hash_memfactor = 8192; 2817c478bd9Sstevel@tonic-gate uint_t ipcl_conn_hash_maxsize = 82500; 2827c478bd9Sstevel@tonic-gate 2837c478bd9Sstevel@tonic-gate /* bind/udp fanout table size */ 2847c478bd9Sstevel@tonic-gate uint_t ipcl_bind_fanout_size = 512; 285ee4701baSericheng uint_t ipcl_udp_fanout_size = 16384; 2867c478bd9Sstevel@tonic-gate 2877c478bd9Sstevel@tonic-gate /* Raw socket fanout size. Must be a power of 2. */ 2887c478bd9Sstevel@tonic-gate uint_t ipcl_raw_fanout_size = 256; 2897c478bd9Sstevel@tonic-gate 2907c478bd9Sstevel@tonic-gate /* 2912b24ab6bSSebastien Roy * The IPCL_IPTUN_HASH() function works best with a prime table size. We 2922b24ab6bSSebastien Roy * expect that most large deployments would have hundreds of tunnels, and 2932b24ab6bSSebastien Roy * thousands in the extreme case. 2942b24ab6bSSebastien Roy */ 2952b24ab6bSSebastien Roy uint_t ipcl_iptun_fanout_size = 6143; 2962b24ab6bSSebastien Roy 2972b24ab6bSSebastien Roy /* 2987c478bd9Sstevel@tonic-gate * Power of 2^N Primes useful for hashing for N of 0-28, 2997c478bd9Sstevel@tonic-gate * these primes are the nearest prime <= 2^N - 2^(N-2). 3007c478bd9Sstevel@tonic-gate */ 3017c478bd9Sstevel@tonic-gate 3027c478bd9Sstevel@tonic-gate #define P2Ps() {0, 0, 0, 5, 11, 23, 47, 89, 191, 383, 761, 1531, 3067, \ 3037c478bd9Sstevel@tonic-gate 6143, 12281, 24571, 49139, 98299, 196597, 393209, \ 3047c478bd9Sstevel@tonic-gate 786431, 1572853, 3145721, 6291449, 12582893, 25165813, \ 3057c478bd9Sstevel@tonic-gate 50331599, 100663291, 201326557, 0} 3067c478bd9Sstevel@tonic-gate 3077c478bd9Sstevel@tonic-gate /* 308fc80c0dfSnordmark * wrapper structure to ensure that conn and what follows it (tcp_t, etc) 309fc80c0dfSnordmark * are aligned on cache lines. 3107c478bd9Sstevel@tonic-gate */ 311fc80c0dfSnordmark typedef union itc_s { 312fc80c0dfSnordmark conn_t itc_conn; 3137c478bd9Sstevel@tonic-gate char itcu_filler[CACHE_ALIGN(conn_s)]; 3147c478bd9Sstevel@tonic-gate } itc_t; 3157c478bd9Sstevel@tonic-gate 316fc80c0dfSnordmark struct kmem_cache *tcp_conn_cache; 317fc80c0dfSnordmark struct kmem_cache *ip_conn_cache; 3187c478bd9Sstevel@tonic-gate extern struct kmem_cache *sctp_conn_cache; 319fc80c0dfSnordmark struct kmem_cache *udp_conn_cache; 320fc80c0dfSnordmark struct kmem_cache *rawip_conn_cache; 321fc80c0dfSnordmark struct kmem_cache *rts_conn_cache; 3227c478bd9Sstevel@tonic-gate 3237c478bd9Sstevel@tonic-gate extern void tcp_timermp_free(tcp_t *); 3247c478bd9Sstevel@tonic-gate extern mblk_t *tcp_timermp_alloc(int); 3257c478bd9Sstevel@tonic-gate 326fc80c0dfSnordmark static int ip_conn_constructor(void *, void *, int); 327fc80c0dfSnordmark static void ip_conn_destructor(void *, void *); 328fc80c0dfSnordmark 329fc80c0dfSnordmark static int tcp_conn_constructor(void *, void *, int); 330fc80c0dfSnordmark static void tcp_conn_destructor(void *, void *); 331fc80c0dfSnordmark 332fc80c0dfSnordmark static int udp_conn_constructor(void *, void *, int); 333fc80c0dfSnordmark static void udp_conn_destructor(void *, void *); 334fc80c0dfSnordmark 335fc80c0dfSnordmark static int rawip_conn_constructor(void *, void *, int); 336fc80c0dfSnordmark static void rawip_conn_destructor(void *, void *); 337fc80c0dfSnordmark 338fc80c0dfSnordmark static int rts_conn_constructor(void *, void *, int); 339fc80c0dfSnordmark static void rts_conn_destructor(void *, void *); 3407c478bd9Sstevel@tonic-gate 3417c478bd9Sstevel@tonic-gate /* 342f4b3ec61Sdh155122 * Global (for all stack instances) init routine 3437c478bd9Sstevel@tonic-gate */ 3447c478bd9Sstevel@tonic-gate void 345f4b3ec61Sdh155122 ipcl_g_init(void) 3467c478bd9Sstevel@tonic-gate { 347fc80c0dfSnordmark ip_conn_cache = kmem_cache_create("ip_conn_cache", 3487c478bd9Sstevel@tonic-gate sizeof (conn_t), CACHE_ALIGN_SIZE, 349fc80c0dfSnordmark ip_conn_constructor, ip_conn_destructor, 350fc80c0dfSnordmark NULL, NULL, NULL, 0); 3517c478bd9Sstevel@tonic-gate 352fc80c0dfSnordmark tcp_conn_cache = kmem_cache_create("tcp_conn_cache", 353fc80c0dfSnordmark sizeof (itc_t) + sizeof (tcp_t), CACHE_ALIGN_SIZE, 354fc80c0dfSnordmark tcp_conn_constructor, tcp_conn_destructor, 35593fcb0b9SKacheong Poon tcp_conn_reclaim, NULL, NULL, 0); 356fc80c0dfSnordmark 357fc80c0dfSnordmark udp_conn_cache = kmem_cache_create("udp_conn_cache", 358fc80c0dfSnordmark sizeof (itc_t) + sizeof (udp_t), CACHE_ALIGN_SIZE, 359fc80c0dfSnordmark udp_conn_constructor, udp_conn_destructor, 360fc80c0dfSnordmark NULL, NULL, NULL, 0); 361fc80c0dfSnordmark 362fc80c0dfSnordmark rawip_conn_cache = kmem_cache_create("rawip_conn_cache", 363fc80c0dfSnordmark sizeof (itc_t) + sizeof (icmp_t), CACHE_ALIGN_SIZE, 364fc80c0dfSnordmark rawip_conn_constructor, rawip_conn_destructor, 365fc80c0dfSnordmark NULL, NULL, NULL, 0); 366fc80c0dfSnordmark 367fc80c0dfSnordmark rts_conn_cache = kmem_cache_create("rts_conn_cache", 368fc80c0dfSnordmark sizeof (itc_t) + sizeof (rts_t), CACHE_ALIGN_SIZE, 369fc80c0dfSnordmark rts_conn_constructor, rts_conn_destructor, 3707c478bd9Sstevel@tonic-gate NULL, NULL, NULL, 0); 371f4b3ec61Sdh155122 } 3727c478bd9Sstevel@tonic-gate 3737c478bd9Sstevel@tonic-gate /* 374f4b3ec61Sdh155122 * ipclassifier intialization routine, sets up hash tables. 375f4b3ec61Sdh155122 */ 376f4b3ec61Sdh155122 void 377f4b3ec61Sdh155122 ipcl_init(ip_stack_t *ipst) 378f4b3ec61Sdh155122 { 379f4b3ec61Sdh155122 int i; 380f4b3ec61Sdh155122 int sizes[] = P2Ps(); 381f4b3ec61Sdh155122 382f4b3ec61Sdh155122 /* 383f4b3ec61Sdh155122 * Calculate size of conn fanout table from /etc/system settings 3847c478bd9Sstevel@tonic-gate */ 3857c478bd9Sstevel@tonic-gate if (ipcl_conn_hash_size != 0) { 386f4b3ec61Sdh155122 ipst->ips_ipcl_conn_fanout_size = ipcl_conn_hash_size; 3877c478bd9Sstevel@tonic-gate } else if (tcp_conn_hash_size != 0) { 388f4b3ec61Sdh155122 ipst->ips_ipcl_conn_fanout_size = tcp_conn_hash_size; 3897c478bd9Sstevel@tonic-gate } else { 3907c478bd9Sstevel@tonic-gate extern pgcnt_t freemem; 3917c478bd9Sstevel@tonic-gate 392f4b3ec61Sdh155122 ipst->ips_ipcl_conn_fanout_size = 3937c478bd9Sstevel@tonic-gate (freemem * PAGESIZE) / ipcl_conn_hash_memfactor; 3947c478bd9Sstevel@tonic-gate 395f4b3ec61Sdh155122 if (ipst->ips_ipcl_conn_fanout_size > ipcl_conn_hash_maxsize) { 396f4b3ec61Sdh155122 ipst->ips_ipcl_conn_fanout_size = 397f4b3ec61Sdh155122 ipcl_conn_hash_maxsize; 398f4b3ec61Sdh155122 } 3997c478bd9Sstevel@tonic-gate } 4007c478bd9Sstevel@tonic-gate 4017c478bd9Sstevel@tonic-gate for (i = 9; i < sizeof (sizes) / sizeof (*sizes) - 1; i++) { 402f4b3ec61Sdh155122 if (sizes[i] >= ipst->ips_ipcl_conn_fanout_size) { 4037c478bd9Sstevel@tonic-gate break; 4047c478bd9Sstevel@tonic-gate } 4057c478bd9Sstevel@tonic-gate } 406f4b3ec61Sdh155122 if ((ipst->ips_ipcl_conn_fanout_size = sizes[i]) == 0) { 4077c478bd9Sstevel@tonic-gate /* Out of range, use the 2^16 value */ 408f4b3ec61Sdh155122 ipst->ips_ipcl_conn_fanout_size = sizes[16]; 4097c478bd9Sstevel@tonic-gate } 4107c478bd9Sstevel@tonic-gate 411f4b3ec61Sdh155122 /* Take values from /etc/system */ 412f4b3ec61Sdh155122 ipst->ips_ipcl_bind_fanout_size = ipcl_bind_fanout_size; 413f4b3ec61Sdh155122 ipst->ips_ipcl_udp_fanout_size = ipcl_udp_fanout_size; 414f4b3ec61Sdh155122 ipst->ips_ipcl_raw_fanout_size = ipcl_raw_fanout_size; 4152b24ab6bSSebastien Roy ipst->ips_ipcl_iptun_fanout_size = ipcl_iptun_fanout_size; 416f4b3ec61Sdh155122 417f4b3ec61Sdh155122 ASSERT(ipst->ips_ipcl_conn_fanout == NULL); 418f4b3ec61Sdh155122 419f4b3ec61Sdh155122 ipst->ips_ipcl_conn_fanout = kmem_zalloc( 420f4b3ec61Sdh155122 ipst->ips_ipcl_conn_fanout_size * sizeof (connf_t), KM_SLEEP); 421f4b3ec61Sdh155122 422f4b3ec61Sdh155122 for (i = 0; i < ipst->ips_ipcl_conn_fanout_size; i++) { 423f4b3ec61Sdh155122 mutex_init(&ipst->ips_ipcl_conn_fanout[i].connf_lock, NULL, 4247c478bd9Sstevel@tonic-gate MUTEX_DEFAULT, NULL); 4257c478bd9Sstevel@tonic-gate } 4267c478bd9Sstevel@tonic-gate 427f4b3ec61Sdh155122 ipst->ips_ipcl_bind_fanout = kmem_zalloc( 428f4b3ec61Sdh155122 ipst->ips_ipcl_bind_fanout_size * sizeof (connf_t), KM_SLEEP); 4297c478bd9Sstevel@tonic-gate 430f4b3ec61Sdh155122 for (i = 0; i < ipst->ips_ipcl_bind_fanout_size; i++) { 431f4b3ec61Sdh155122 mutex_init(&ipst->ips_ipcl_bind_fanout[i].connf_lock, NULL, 4327c478bd9Sstevel@tonic-gate MUTEX_DEFAULT, NULL); 4337c478bd9Sstevel@tonic-gate } 4347c478bd9Sstevel@tonic-gate 435bd670b35SErik Nordmark ipst->ips_ipcl_proto_fanout_v4 = kmem_zalloc(IPPROTO_MAX * 436f4b3ec61Sdh155122 sizeof (connf_t), KM_SLEEP); 437f4b3ec61Sdh155122 for (i = 0; i < IPPROTO_MAX; i++) { 438bd670b35SErik Nordmark mutex_init(&ipst->ips_ipcl_proto_fanout_v4[i].connf_lock, NULL, 4397c478bd9Sstevel@tonic-gate MUTEX_DEFAULT, NULL); 4407c478bd9Sstevel@tonic-gate } 4417c478bd9Sstevel@tonic-gate 442f4b3ec61Sdh155122 ipst->ips_ipcl_proto_fanout_v6 = kmem_zalloc(IPPROTO_MAX * 443f4b3ec61Sdh155122 sizeof (connf_t), KM_SLEEP); 444f4b3ec61Sdh155122 for (i = 0; i < IPPROTO_MAX; i++) { 445f4b3ec61Sdh155122 mutex_init(&ipst->ips_ipcl_proto_fanout_v6[i].connf_lock, NULL, 4467c478bd9Sstevel@tonic-gate MUTEX_DEFAULT, NULL); 4477c478bd9Sstevel@tonic-gate } 4487c478bd9Sstevel@tonic-gate 449f4b3ec61Sdh155122 ipst->ips_rts_clients = kmem_zalloc(sizeof (connf_t), KM_SLEEP); 450f4b3ec61Sdh155122 mutex_init(&ipst->ips_rts_clients->connf_lock, 451f4b3ec61Sdh155122 NULL, MUTEX_DEFAULT, NULL); 4527c478bd9Sstevel@tonic-gate 453f4b3ec61Sdh155122 ipst->ips_ipcl_udp_fanout = kmem_zalloc( 454f4b3ec61Sdh155122 ipst->ips_ipcl_udp_fanout_size * sizeof (connf_t), KM_SLEEP); 455f4b3ec61Sdh155122 for (i = 0; i < ipst->ips_ipcl_udp_fanout_size; i++) { 456f4b3ec61Sdh155122 mutex_init(&ipst->ips_ipcl_udp_fanout[i].connf_lock, NULL, 4577c478bd9Sstevel@tonic-gate MUTEX_DEFAULT, NULL); 4587c478bd9Sstevel@tonic-gate } 4597c478bd9Sstevel@tonic-gate 4602b24ab6bSSebastien Roy ipst->ips_ipcl_iptun_fanout = kmem_zalloc( 4612b24ab6bSSebastien Roy ipst->ips_ipcl_iptun_fanout_size * sizeof (connf_t), KM_SLEEP); 4622b24ab6bSSebastien Roy for (i = 0; i < ipst->ips_ipcl_iptun_fanout_size; i++) { 4632b24ab6bSSebastien Roy mutex_init(&ipst->ips_ipcl_iptun_fanout[i].connf_lock, NULL, 4642b24ab6bSSebastien Roy MUTEX_DEFAULT, NULL); 4652b24ab6bSSebastien Roy } 4662b24ab6bSSebastien Roy 467f4b3ec61Sdh155122 ipst->ips_ipcl_raw_fanout = kmem_zalloc( 468f4b3ec61Sdh155122 ipst->ips_ipcl_raw_fanout_size * sizeof (connf_t), KM_SLEEP); 469f4b3ec61Sdh155122 for (i = 0; i < ipst->ips_ipcl_raw_fanout_size; i++) { 470f4b3ec61Sdh155122 mutex_init(&ipst->ips_ipcl_raw_fanout[i].connf_lock, NULL, 471f4b3ec61Sdh155122 MUTEX_DEFAULT, NULL); 472f4b3ec61Sdh155122 } 4737c478bd9Sstevel@tonic-gate 474f4b3ec61Sdh155122 ipst->ips_ipcl_globalhash_fanout = kmem_zalloc( 475f4b3ec61Sdh155122 sizeof (connf_t) * CONN_G_HASH_SIZE, KM_SLEEP); 4767c478bd9Sstevel@tonic-gate for (i = 0; i < CONN_G_HASH_SIZE; i++) { 477f4b3ec61Sdh155122 mutex_init(&ipst->ips_ipcl_globalhash_fanout[i].connf_lock, 478f4b3ec61Sdh155122 NULL, MUTEX_DEFAULT, NULL); 4797c478bd9Sstevel@tonic-gate } 4807c478bd9Sstevel@tonic-gate } 4817c478bd9Sstevel@tonic-gate 4827c478bd9Sstevel@tonic-gate void 483f4b3ec61Sdh155122 ipcl_g_destroy(void) 4847c478bd9Sstevel@tonic-gate { 485fc80c0dfSnordmark kmem_cache_destroy(ip_conn_cache); 486fc80c0dfSnordmark kmem_cache_destroy(tcp_conn_cache); 487fc80c0dfSnordmark kmem_cache_destroy(udp_conn_cache); 488fc80c0dfSnordmark kmem_cache_destroy(rawip_conn_cache); 489fc80c0dfSnordmark kmem_cache_destroy(rts_conn_cache); 490f4b3ec61Sdh155122 } 4917c478bd9Sstevel@tonic-gate 492f4b3ec61Sdh155122 /* 493f4b3ec61Sdh155122 * All user-level and kernel use of the stack must be gone 494f4b3ec61Sdh155122 * by now. 495f4b3ec61Sdh155122 */ 496f4b3ec61Sdh155122 void 497f4b3ec61Sdh155122 ipcl_destroy(ip_stack_t *ipst) 498f4b3ec61Sdh155122 { 499f4b3ec61Sdh155122 int i; 5007c478bd9Sstevel@tonic-gate 501f4b3ec61Sdh155122 for (i = 0; i < ipst->ips_ipcl_conn_fanout_size; i++) { 502f4b3ec61Sdh155122 ASSERT(ipst->ips_ipcl_conn_fanout[i].connf_head == NULL); 503f4b3ec61Sdh155122 mutex_destroy(&ipst->ips_ipcl_conn_fanout[i].connf_lock); 504f4b3ec61Sdh155122 } 505f4b3ec61Sdh155122 kmem_free(ipst->ips_ipcl_conn_fanout, ipst->ips_ipcl_conn_fanout_size * 506f4b3ec61Sdh155122 sizeof (connf_t)); 507f4b3ec61Sdh155122 ipst->ips_ipcl_conn_fanout = NULL; 5087c478bd9Sstevel@tonic-gate 509f4b3ec61Sdh155122 for (i = 0; i < ipst->ips_ipcl_bind_fanout_size; i++) { 510f4b3ec61Sdh155122 ASSERT(ipst->ips_ipcl_bind_fanout[i].connf_head == NULL); 511f4b3ec61Sdh155122 mutex_destroy(&ipst->ips_ipcl_bind_fanout[i].connf_lock); 512f4b3ec61Sdh155122 } 513f4b3ec61Sdh155122 kmem_free(ipst->ips_ipcl_bind_fanout, ipst->ips_ipcl_bind_fanout_size * 514f4b3ec61Sdh155122 sizeof (connf_t)); 515f4b3ec61Sdh155122 ipst->ips_ipcl_bind_fanout = NULL; 5167c478bd9Sstevel@tonic-gate 517f4b3ec61Sdh155122 for (i = 0; i < IPPROTO_MAX; i++) { 518bd670b35SErik Nordmark ASSERT(ipst->ips_ipcl_proto_fanout_v4[i].connf_head == NULL); 519bd670b35SErik Nordmark mutex_destroy(&ipst->ips_ipcl_proto_fanout_v4[i].connf_lock); 520f4b3ec61Sdh155122 } 521bd670b35SErik Nordmark kmem_free(ipst->ips_ipcl_proto_fanout_v4, 522bd670b35SErik Nordmark IPPROTO_MAX * sizeof (connf_t)); 523bd670b35SErik Nordmark ipst->ips_ipcl_proto_fanout_v4 = NULL; 524f4b3ec61Sdh155122 525f4b3ec61Sdh155122 for (i = 0; i < IPPROTO_MAX; i++) { 526f4b3ec61Sdh155122 ASSERT(ipst->ips_ipcl_proto_fanout_v6[i].connf_head == NULL); 527f4b3ec61Sdh155122 mutex_destroy(&ipst->ips_ipcl_proto_fanout_v6[i].connf_lock); 528f4b3ec61Sdh155122 } 529f4b3ec61Sdh155122 kmem_free(ipst->ips_ipcl_proto_fanout_v6, 530f4b3ec61Sdh155122 IPPROTO_MAX * sizeof (connf_t)); 531f4b3ec61Sdh155122 ipst->ips_ipcl_proto_fanout_v6 = NULL; 532f4b3ec61Sdh155122 533f4b3ec61Sdh155122 for (i = 0; i < ipst->ips_ipcl_udp_fanout_size; i++) { 534f4b3ec61Sdh155122 ASSERT(ipst->ips_ipcl_udp_fanout[i].connf_head == NULL); 535f4b3ec61Sdh155122 mutex_destroy(&ipst->ips_ipcl_udp_fanout[i].connf_lock); 536f4b3ec61Sdh155122 } 537f4b3ec61Sdh155122 kmem_free(ipst->ips_ipcl_udp_fanout, ipst->ips_ipcl_udp_fanout_size * 538f4b3ec61Sdh155122 sizeof (connf_t)); 539f4b3ec61Sdh155122 ipst->ips_ipcl_udp_fanout = NULL; 540f4b3ec61Sdh155122 5412b24ab6bSSebastien Roy for (i = 0; i < ipst->ips_ipcl_iptun_fanout_size; i++) { 5422b24ab6bSSebastien Roy ASSERT(ipst->ips_ipcl_iptun_fanout[i].connf_head == NULL); 5432b24ab6bSSebastien Roy mutex_destroy(&ipst->ips_ipcl_iptun_fanout[i].connf_lock); 5442b24ab6bSSebastien Roy } 5452b24ab6bSSebastien Roy kmem_free(ipst->ips_ipcl_iptun_fanout, 5462b24ab6bSSebastien Roy ipst->ips_ipcl_iptun_fanout_size * sizeof (connf_t)); 5472b24ab6bSSebastien Roy ipst->ips_ipcl_iptun_fanout = NULL; 5482b24ab6bSSebastien Roy 549f4b3ec61Sdh155122 for (i = 0; i < ipst->ips_ipcl_raw_fanout_size; i++) { 550f4b3ec61Sdh155122 ASSERT(ipst->ips_ipcl_raw_fanout[i].connf_head == NULL); 551f4b3ec61Sdh155122 mutex_destroy(&ipst->ips_ipcl_raw_fanout[i].connf_lock); 552f4b3ec61Sdh155122 } 553f4b3ec61Sdh155122 kmem_free(ipst->ips_ipcl_raw_fanout, ipst->ips_ipcl_raw_fanout_size * 554f4b3ec61Sdh155122 sizeof (connf_t)); 555f4b3ec61Sdh155122 ipst->ips_ipcl_raw_fanout = NULL; 556f4b3ec61Sdh155122 557f4b3ec61Sdh155122 for (i = 0; i < CONN_G_HASH_SIZE; i++) { 558f4b3ec61Sdh155122 ASSERT(ipst->ips_ipcl_globalhash_fanout[i].connf_head == NULL); 559f4b3ec61Sdh155122 mutex_destroy(&ipst->ips_ipcl_globalhash_fanout[i].connf_lock); 560f4b3ec61Sdh155122 } 561f4b3ec61Sdh155122 kmem_free(ipst->ips_ipcl_globalhash_fanout, 562f4b3ec61Sdh155122 sizeof (connf_t) * CONN_G_HASH_SIZE); 563f4b3ec61Sdh155122 ipst->ips_ipcl_globalhash_fanout = NULL; 564f4b3ec61Sdh155122 565f4b3ec61Sdh155122 ASSERT(ipst->ips_rts_clients->connf_head == NULL); 566f4b3ec61Sdh155122 mutex_destroy(&ipst->ips_rts_clients->connf_lock); 567f4b3ec61Sdh155122 kmem_free(ipst->ips_rts_clients, sizeof (connf_t)); 568f4b3ec61Sdh155122 ipst->ips_rts_clients = NULL; 5697c478bd9Sstevel@tonic-gate } 5707c478bd9Sstevel@tonic-gate 5717c478bd9Sstevel@tonic-gate /* 5727c478bd9Sstevel@tonic-gate * conn creation routine. initialize the conn, sets the reference 5737c478bd9Sstevel@tonic-gate * and inserts it in the global hash table. 5747c478bd9Sstevel@tonic-gate */ 5757c478bd9Sstevel@tonic-gate conn_t * 576f4b3ec61Sdh155122 ipcl_conn_create(uint32_t type, int sleep, netstack_t *ns) 5777c478bd9Sstevel@tonic-gate { 5787c478bd9Sstevel@tonic-gate conn_t *connp; 579fc80c0dfSnordmark struct kmem_cache *conn_cache; 5807c478bd9Sstevel@tonic-gate 5817c478bd9Sstevel@tonic-gate switch (type) { 5827c478bd9Sstevel@tonic-gate case IPCL_SCTPCONN: 5837c478bd9Sstevel@tonic-gate if ((connp = kmem_cache_alloc(sctp_conn_cache, sleep)) == NULL) 5847c478bd9Sstevel@tonic-gate return (NULL); 585121e5416Skcpoon sctp_conn_init(connp); 586f4b3ec61Sdh155122 netstack_hold(ns); 587f4b3ec61Sdh155122 connp->conn_netstack = ns; 588bd670b35SErik Nordmark connp->conn_ixa->ixa_ipst = ns->netstack_ip; 5899cd928feSAlan Maguire connp->conn_ixa->ixa_conn_id = (long)connp; 590bd670b35SErik Nordmark ipcl_globalhash_insert(connp); 591fc80c0dfSnordmark return (connp); 592fc80c0dfSnordmark 593fc80c0dfSnordmark case IPCL_TCPCONN: 594fc80c0dfSnordmark conn_cache = tcp_conn_cache; 5957c478bd9Sstevel@tonic-gate break; 596fc80c0dfSnordmark 597fc80c0dfSnordmark case IPCL_UDPCONN: 598fc80c0dfSnordmark conn_cache = udp_conn_cache; 599fc80c0dfSnordmark break; 600fc80c0dfSnordmark 601fc80c0dfSnordmark case IPCL_RAWIPCONN: 602fc80c0dfSnordmark conn_cache = rawip_conn_cache; 603fc80c0dfSnordmark break; 604fc80c0dfSnordmark 605fc80c0dfSnordmark case IPCL_RTSCONN: 606fc80c0dfSnordmark conn_cache = rts_conn_cache; 607fc80c0dfSnordmark break; 608fc80c0dfSnordmark 6097c478bd9Sstevel@tonic-gate case IPCL_IPCCONN: 610fc80c0dfSnordmark conn_cache = ip_conn_cache; 6117c478bd9Sstevel@tonic-gate break; 612fc80c0dfSnordmark 613ff550d0eSmasputra default: 614ff550d0eSmasputra connp = NULL; 615ff550d0eSmasputra ASSERT(0); 6167c478bd9Sstevel@tonic-gate } 6177c478bd9Sstevel@tonic-gate 618fc80c0dfSnordmark if ((connp = kmem_cache_alloc(conn_cache, sleep)) == NULL) 619fc80c0dfSnordmark return (NULL); 620fc80c0dfSnordmark 621fc80c0dfSnordmark connp->conn_ref = 1; 622fc80c0dfSnordmark netstack_hold(ns); 623fc80c0dfSnordmark connp->conn_netstack = ns; 624bd670b35SErik Nordmark connp->conn_ixa->ixa_ipst = ns->netstack_ip; 6259cd928feSAlan Maguire connp->conn_ixa->ixa_conn_id = (long)connp; 626fc80c0dfSnordmark ipcl_globalhash_insert(connp); 6277c478bd9Sstevel@tonic-gate return (connp); 6287c478bd9Sstevel@tonic-gate } 6297c478bd9Sstevel@tonic-gate 6307c478bd9Sstevel@tonic-gate void 6317c478bd9Sstevel@tonic-gate ipcl_conn_destroy(conn_t *connp) 6327c478bd9Sstevel@tonic-gate { 6337c478bd9Sstevel@tonic-gate mblk_t *mp; 634f4b3ec61Sdh155122 netstack_t *ns = connp->conn_netstack; 6357c478bd9Sstevel@tonic-gate 6367c478bd9Sstevel@tonic-gate ASSERT(!MUTEX_HELD(&connp->conn_lock)); 6377c478bd9Sstevel@tonic-gate ASSERT(connp->conn_ref == 0); 638*a5628610SRamesh Kumar Katla ASSERT(connp->conn_ioctlref == 0); 6397c478bd9Sstevel@tonic-gate 640fab254e2SAruna Ramakrishna DTRACE_PROBE1(conn__destroy, conn_t *, connp); 641fab254e2SAruna Ramakrishna 64245916cd2Sjpk if (connp->conn_cred != NULL) { 64345916cd2Sjpk crfree(connp->conn_cred); 64445916cd2Sjpk connp->conn_cred = NULL; 64576a1033eSErik Nordmark /* ixa_cred done in ipcl_conn_cleanup below */ 64645916cd2Sjpk } 64745916cd2Sjpk 648bd670b35SErik Nordmark if (connp->conn_ht_iphc != NULL) { 649bd670b35SErik Nordmark kmem_free(connp->conn_ht_iphc, connp->conn_ht_iphc_allocated); 650bd670b35SErik Nordmark connp->conn_ht_iphc = NULL; 651bd670b35SErik Nordmark connp->conn_ht_iphc_allocated = 0; 652bd670b35SErik Nordmark connp->conn_ht_iphc_len = 0; 653bd670b35SErik Nordmark connp->conn_ht_ulp = NULL; 654bd670b35SErik Nordmark connp->conn_ht_ulp_len = 0; 655bd670b35SErik Nordmark } 656bd670b35SErik Nordmark ip_pkt_free(&connp->conn_xmit_ipp); 657bd670b35SErik Nordmark 6587c478bd9Sstevel@tonic-gate ipcl_globalhash_remove(connp); 6597c478bd9Sstevel@tonic-gate 660f4b3ec61Sdh155122 if (connp->conn_latch != NULL) { 661bd670b35SErik Nordmark IPLATCH_REFRELE(connp->conn_latch); 662f4b3ec61Sdh155122 connp->conn_latch = NULL; 663f4b3ec61Sdh155122 } 664bd670b35SErik Nordmark if (connp->conn_latch_in_policy != NULL) { 665bd670b35SErik Nordmark IPPOL_REFRELE(connp->conn_latch_in_policy); 666bd670b35SErik Nordmark connp->conn_latch_in_policy = NULL; 667bd670b35SErik Nordmark } 668bd670b35SErik Nordmark if (connp->conn_latch_in_action != NULL) { 669bd670b35SErik Nordmark IPACT_REFRELE(connp->conn_latch_in_action); 670bd670b35SErik Nordmark connp->conn_latch_in_action = NULL; 671bd670b35SErik Nordmark } 672f4b3ec61Sdh155122 if (connp->conn_policy != NULL) { 673f4b3ec61Sdh155122 IPPH_REFRELE(connp->conn_policy, ns); 674f4b3ec61Sdh155122 connp->conn_policy = NULL; 675f4b3ec61Sdh155122 } 676bd670b35SErik Nordmark 677bd670b35SErik Nordmark if (connp->conn_ipsec_opt_mp != NULL) { 678bd670b35SErik Nordmark freemsg(connp->conn_ipsec_opt_mp); 679bd670b35SErik Nordmark connp->conn_ipsec_opt_mp = NULL; 680f4b3ec61Sdh155122 } 681ff550d0eSmasputra 682bd670b35SErik Nordmark if (connp->conn_flags & IPCL_TCPCONN) { 683bd670b35SErik Nordmark tcp_t *tcp = connp->conn_tcp; 684bd670b35SErik Nordmark 6857c478bd9Sstevel@tonic-gate tcp_free(tcp); 6867c478bd9Sstevel@tonic-gate mp = tcp->tcp_timercache; 687bd670b35SErik Nordmark 688bd670b35SErik Nordmark tcp->tcp_tcps = NULL; 6897c478bd9Sstevel@tonic-gate 690f7f8e53dSKacheong Poon /* 691f7f8e53dSKacheong Poon * tcp_rsrv_mp can be NULL if tcp_get_conn() fails to allocate 692f7f8e53dSKacheong Poon * the mblk. 693f7f8e53dSKacheong Poon */ 694f7f8e53dSKacheong Poon if (tcp->tcp_rsrv_mp != NULL) { 695f7f8e53dSKacheong Poon freeb(tcp->tcp_rsrv_mp); 696f7f8e53dSKacheong Poon tcp->tcp_rsrv_mp = NULL; 697f7f8e53dSKacheong Poon mutex_destroy(&tcp->tcp_rsrv_mp_lock); 698f7f8e53dSKacheong Poon } 699f7f8e53dSKacheong Poon 700bd670b35SErik Nordmark ipcl_conn_cleanup(connp); 701bd670b35SErik Nordmark connp->conn_flags = IPCL_TCPCONN; 702f4b3ec61Sdh155122 if (ns != NULL) { 703f4b3ec61Sdh155122 ASSERT(tcp->tcp_tcps == NULL); 704f4b3ec61Sdh155122 connp->conn_netstack = NULL; 705bd670b35SErik Nordmark connp->conn_ixa->ixa_ipst = NULL; 706f4b3ec61Sdh155122 netstack_rele(ns); 707f4b3ec61Sdh155122 } 708fc80c0dfSnordmark 709fc80c0dfSnordmark bzero(tcp, sizeof (tcp_t)); 710fc80c0dfSnordmark 711fc80c0dfSnordmark tcp->tcp_timercache = mp; 712fc80c0dfSnordmark tcp->tcp_connp = connp; 713fc80c0dfSnordmark kmem_cache_free(tcp_conn_cache, connp); 714fc80c0dfSnordmark return; 715fc80c0dfSnordmark } 716fc80c0dfSnordmark 717fc80c0dfSnordmark if (connp->conn_flags & IPCL_SCTPCONN) { 718f4b3ec61Sdh155122 ASSERT(ns != NULL); 7197c478bd9Sstevel@tonic-gate sctp_free(connp); 720fc80c0dfSnordmark return; 721fc80c0dfSnordmark } 722fc80c0dfSnordmark 723bd670b35SErik Nordmark ipcl_conn_cleanup(connp); 724f4b3ec61Sdh155122 if (ns != NULL) { 725f4b3ec61Sdh155122 connp->conn_netstack = NULL; 726bd670b35SErik Nordmark connp->conn_ixa->ixa_ipst = NULL; 727f4b3ec61Sdh155122 netstack_rele(ns); 728f4b3ec61Sdh155122 } 7290f1702c5SYu Xiangning 730fc80c0dfSnordmark /* leave conn_priv aka conn_udp, conn_icmp, etc in place. */ 731fc80c0dfSnordmark if (connp->conn_flags & IPCL_UDPCONN) { 732fc80c0dfSnordmark connp->conn_flags = IPCL_UDPCONN; 733fc80c0dfSnordmark kmem_cache_free(udp_conn_cache, connp); 734fc80c0dfSnordmark } else if (connp->conn_flags & IPCL_RAWIPCONN) { 735fc80c0dfSnordmark connp->conn_flags = IPCL_RAWIPCONN; 736bd670b35SErik Nordmark connp->conn_proto = IPPROTO_ICMP; 737bd670b35SErik Nordmark connp->conn_ixa->ixa_protocol = connp->conn_proto; 738fc80c0dfSnordmark kmem_cache_free(rawip_conn_cache, connp); 739fc80c0dfSnordmark } else if (connp->conn_flags & IPCL_RTSCONN) { 740fc80c0dfSnordmark connp->conn_flags = IPCL_RTSCONN; 741fc80c0dfSnordmark kmem_cache_free(rts_conn_cache, connp); 742fc80c0dfSnordmark } else { 743fc80c0dfSnordmark connp->conn_flags = IPCL_IPCCONN; 744fc80c0dfSnordmark ASSERT(connp->conn_flags & IPCL_IPCCONN); 745fc80c0dfSnordmark ASSERT(connp->conn_priv == NULL); 746fc80c0dfSnordmark kmem_cache_free(ip_conn_cache, connp); 7477c478bd9Sstevel@tonic-gate } 7487c478bd9Sstevel@tonic-gate } 7497c478bd9Sstevel@tonic-gate 7507c478bd9Sstevel@tonic-gate /* 7517c478bd9Sstevel@tonic-gate * Running in cluster mode - deregister listener information 7527c478bd9Sstevel@tonic-gate */ 7537c478bd9Sstevel@tonic-gate static void 7547c478bd9Sstevel@tonic-gate ipcl_conn_unlisten(conn_t *connp) 7557c478bd9Sstevel@tonic-gate { 7567c478bd9Sstevel@tonic-gate ASSERT((connp->conn_flags & IPCL_CL_LISTENER) != 0); 7577c478bd9Sstevel@tonic-gate ASSERT(connp->conn_lport != 0); 7587c478bd9Sstevel@tonic-gate 7597c478bd9Sstevel@tonic-gate if (cl_inet_unlisten != NULL) { 7607c478bd9Sstevel@tonic-gate sa_family_t addr_family; 7617c478bd9Sstevel@tonic-gate uint8_t *laddrp; 7627c478bd9Sstevel@tonic-gate 763bd670b35SErik Nordmark if (connp->conn_ipversion == IPV6_VERSION) { 7647c478bd9Sstevel@tonic-gate addr_family = AF_INET6; 765bd670b35SErik Nordmark laddrp = (uint8_t *)&connp->conn_bound_addr_v6; 7667c478bd9Sstevel@tonic-gate } else { 7677c478bd9Sstevel@tonic-gate addr_family = AF_INET; 768bd670b35SErik Nordmark laddrp = (uint8_t *)&connp->conn_bound_addr_v4; 7697c478bd9Sstevel@tonic-gate } 7708e4b770fSLu Huafeng (*cl_inet_unlisten)(connp->conn_netstack->netstack_stackid, 7718e4b770fSLu Huafeng IPPROTO_TCP, addr_family, laddrp, connp->conn_lport, NULL); 7727c478bd9Sstevel@tonic-gate } 7737c478bd9Sstevel@tonic-gate connp->conn_flags &= ~IPCL_CL_LISTENER; 7747c478bd9Sstevel@tonic-gate } 7757c478bd9Sstevel@tonic-gate 7767c478bd9Sstevel@tonic-gate /* 7777c478bd9Sstevel@tonic-gate * We set the IPCL_REMOVED flag (instead of clearing the flag indicating 7787c478bd9Sstevel@tonic-gate * which table the conn belonged to). So for debugging we can see which hash 7797c478bd9Sstevel@tonic-gate * table this connection was in. 7807c478bd9Sstevel@tonic-gate */ 7817c478bd9Sstevel@tonic-gate #define IPCL_HASH_REMOVE(connp) { \ 7827c478bd9Sstevel@tonic-gate connf_t *connfp = (connp)->conn_fanout; \ 7837c478bd9Sstevel@tonic-gate ASSERT(!MUTEX_HELD(&((connp)->conn_lock))); \ 7847c478bd9Sstevel@tonic-gate if (connfp != NULL) { \ 7857c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); \ 7867c478bd9Sstevel@tonic-gate if ((connp)->conn_next != NULL) \ 7877c478bd9Sstevel@tonic-gate (connp)->conn_next->conn_prev = \ 7887c478bd9Sstevel@tonic-gate (connp)->conn_prev; \ 7897c478bd9Sstevel@tonic-gate if ((connp)->conn_prev != NULL) \ 7907c478bd9Sstevel@tonic-gate (connp)->conn_prev->conn_next = \ 7917c478bd9Sstevel@tonic-gate (connp)->conn_next; \ 7927c478bd9Sstevel@tonic-gate else \ 7937c478bd9Sstevel@tonic-gate connfp->connf_head = (connp)->conn_next; \ 7947c478bd9Sstevel@tonic-gate (connp)->conn_fanout = NULL; \ 7957c478bd9Sstevel@tonic-gate (connp)->conn_next = NULL; \ 7967c478bd9Sstevel@tonic-gate (connp)->conn_prev = NULL; \ 7977c478bd9Sstevel@tonic-gate (connp)->conn_flags |= IPCL_REMOVED; \ 7987c478bd9Sstevel@tonic-gate if (((connp)->conn_flags & IPCL_CL_LISTENER) != 0) \ 7997c478bd9Sstevel@tonic-gate ipcl_conn_unlisten((connp)); \ 8007c478bd9Sstevel@tonic-gate CONN_DEC_REF((connp)); \ 8017c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); \ 8027c478bd9Sstevel@tonic-gate } \ 8037c478bd9Sstevel@tonic-gate } 8047c478bd9Sstevel@tonic-gate 8057c478bd9Sstevel@tonic-gate void 8067c478bd9Sstevel@tonic-gate ipcl_hash_remove(conn_t *connp) 8077c478bd9Sstevel@tonic-gate { 808bd670b35SErik Nordmark uint8_t protocol = connp->conn_proto; 809bd670b35SErik Nordmark 8107c478bd9Sstevel@tonic-gate IPCL_HASH_REMOVE(connp); 811bd670b35SErik Nordmark if (protocol == IPPROTO_RSVP) 812bd670b35SErik Nordmark ill_set_inputfn_all(connp->conn_netstack->netstack_ip); 8137c478bd9Sstevel@tonic-gate } 8147c478bd9Sstevel@tonic-gate 8157c478bd9Sstevel@tonic-gate /* 8167c478bd9Sstevel@tonic-gate * The whole purpose of this function is allow removal of 8177c478bd9Sstevel@tonic-gate * a conn_t from the connected hash for timewait reclaim. 8187c478bd9Sstevel@tonic-gate * This is essentially a TW reclaim fastpath where timewait 8197c478bd9Sstevel@tonic-gate * collector checks under fanout lock (so no one else can 8207c478bd9Sstevel@tonic-gate * get access to the conn_t) that refcnt is 2 i.e. one for 8217c478bd9Sstevel@tonic-gate * TCP and one for the classifier hash list. If ref count 8227c478bd9Sstevel@tonic-gate * is indeed 2, we can just remove the conn under lock and 8237c478bd9Sstevel@tonic-gate * avoid cleaning up the conn under squeue. This gives us 8247c478bd9Sstevel@tonic-gate * improved performance. 8257c478bd9Sstevel@tonic-gate */ 8267c478bd9Sstevel@tonic-gate void 8277c478bd9Sstevel@tonic-gate ipcl_hash_remove_locked(conn_t *connp, connf_t *connfp) 8287c478bd9Sstevel@tonic-gate { 8297c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&connfp->connf_lock)); 8307c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&connp->conn_lock)); 8317c478bd9Sstevel@tonic-gate ASSERT((connp->conn_flags & IPCL_CL_LISTENER) == 0); 8327c478bd9Sstevel@tonic-gate 8337c478bd9Sstevel@tonic-gate if ((connp)->conn_next != NULL) { 834121e5416Skcpoon (connp)->conn_next->conn_prev = (connp)->conn_prev; 8357c478bd9Sstevel@tonic-gate } 8367c478bd9Sstevel@tonic-gate if ((connp)->conn_prev != NULL) { 837121e5416Skcpoon (connp)->conn_prev->conn_next = (connp)->conn_next; 8387c478bd9Sstevel@tonic-gate } else { 8397c478bd9Sstevel@tonic-gate connfp->connf_head = (connp)->conn_next; 8407c478bd9Sstevel@tonic-gate } 8417c478bd9Sstevel@tonic-gate (connp)->conn_fanout = NULL; 8427c478bd9Sstevel@tonic-gate (connp)->conn_next = NULL; 8437c478bd9Sstevel@tonic-gate (connp)->conn_prev = NULL; 8447c478bd9Sstevel@tonic-gate (connp)->conn_flags |= IPCL_REMOVED; 8457c478bd9Sstevel@tonic-gate ASSERT((connp)->conn_ref == 2); 8467c478bd9Sstevel@tonic-gate (connp)->conn_ref--; 8477c478bd9Sstevel@tonic-gate } 8487c478bd9Sstevel@tonic-gate 8497c478bd9Sstevel@tonic-gate #define IPCL_HASH_INSERT_CONNECTED_LOCKED(connfp, connp) { \ 8507c478bd9Sstevel@tonic-gate ASSERT((connp)->conn_fanout == NULL); \ 8517c478bd9Sstevel@tonic-gate ASSERT((connp)->conn_next == NULL); \ 8527c478bd9Sstevel@tonic-gate ASSERT((connp)->conn_prev == NULL); \ 8537c478bd9Sstevel@tonic-gate if ((connfp)->connf_head != NULL) { \ 8547c478bd9Sstevel@tonic-gate (connfp)->connf_head->conn_prev = (connp); \ 8557c478bd9Sstevel@tonic-gate (connp)->conn_next = (connfp)->connf_head; \ 8567c478bd9Sstevel@tonic-gate } \ 8577c478bd9Sstevel@tonic-gate (connp)->conn_fanout = (connfp); \ 8587c478bd9Sstevel@tonic-gate (connfp)->connf_head = (connp); \ 8597c478bd9Sstevel@tonic-gate (connp)->conn_flags = ((connp)->conn_flags & ~IPCL_REMOVED) | \ 8607c478bd9Sstevel@tonic-gate IPCL_CONNECTED; \ 8617c478bd9Sstevel@tonic-gate CONN_INC_REF(connp); \ 8627c478bd9Sstevel@tonic-gate } 8637c478bd9Sstevel@tonic-gate 8647c478bd9Sstevel@tonic-gate #define IPCL_HASH_INSERT_CONNECTED(connfp, connp) { \ 8657c478bd9Sstevel@tonic-gate IPCL_HASH_REMOVE((connp)); \ 8667c478bd9Sstevel@tonic-gate mutex_enter(&(connfp)->connf_lock); \ 8677c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_CONNECTED_LOCKED(connfp, connp); \ 8687c478bd9Sstevel@tonic-gate mutex_exit(&(connfp)->connf_lock); \ 8697c478bd9Sstevel@tonic-gate } 8707c478bd9Sstevel@tonic-gate 8717c478bd9Sstevel@tonic-gate #define IPCL_HASH_INSERT_BOUND(connfp, connp) { \ 8727c478bd9Sstevel@tonic-gate conn_t *pconnp = NULL, *nconnp; \ 8737c478bd9Sstevel@tonic-gate IPCL_HASH_REMOVE((connp)); \ 8747c478bd9Sstevel@tonic-gate mutex_enter(&(connfp)->connf_lock); \ 8757c478bd9Sstevel@tonic-gate nconnp = (connfp)->connf_head; \ 8767c478bd9Sstevel@tonic-gate while (nconnp != NULL && \ 877bd670b35SErik Nordmark !_IPCL_V4_MATCH_ANY(nconnp->conn_laddr_v6)) { \ 8787c478bd9Sstevel@tonic-gate pconnp = nconnp; \ 8797c478bd9Sstevel@tonic-gate nconnp = nconnp->conn_next; \ 8807c478bd9Sstevel@tonic-gate } \ 8817c478bd9Sstevel@tonic-gate if (pconnp != NULL) { \ 8827c478bd9Sstevel@tonic-gate pconnp->conn_next = (connp); \ 8837c478bd9Sstevel@tonic-gate (connp)->conn_prev = pconnp; \ 8847c478bd9Sstevel@tonic-gate } else { \ 8857c478bd9Sstevel@tonic-gate (connfp)->connf_head = (connp); \ 8867c478bd9Sstevel@tonic-gate } \ 8877c478bd9Sstevel@tonic-gate if (nconnp != NULL) { \ 8887c478bd9Sstevel@tonic-gate (connp)->conn_next = nconnp; \ 8897c478bd9Sstevel@tonic-gate nconnp->conn_prev = (connp); \ 8907c478bd9Sstevel@tonic-gate } \ 8917c478bd9Sstevel@tonic-gate (connp)->conn_fanout = (connfp); \ 8927c478bd9Sstevel@tonic-gate (connp)->conn_flags = ((connp)->conn_flags & ~IPCL_REMOVED) | \ 8937c478bd9Sstevel@tonic-gate IPCL_BOUND; \ 8947c478bd9Sstevel@tonic-gate CONN_INC_REF(connp); \ 8957c478bd9Sstevel@tonic-gate mutex_exit(&(connfp)->connf_lock); \ 8967c478bd9Sstevel@tonic-gate } 8977c478bd9Sstevel@tonic-gate 8987c478bd9Sstevel@tonic-gate #define IPCL_HASH_INSERT_WILDCARD(connfp, connp) { \ 8997c478bd9Sstevel@tonic-gate conn_t **list, *prev, *next; \ 9007c478bd9Sstevel@tonic-gate boolean_t isv4mapped = \ 901bd670b35SErik Nordmark IN6_IS_ADDR_V4MAPPED(&(connp)->conn_laddr_v6); \ 9027c478bd9Sstevel@tonic-gate IPCL_HASH_REMOVE((connp)); \ 9037c478bd9Sstevel@tonic-gate mutex_enter(&(connfp)->connf_lock); \ 9047c478bd9Sstevel@tonic-gate list = &(connfp)->connf_head; \ 9057c478bd9Sstevel@tonic-gate prev = NULL; \ 9067c478bd9Sstevel@tonic-gate while ((next = *list) != NULL) { \ 9077c478bd9Sstevel@tonic-gate if (isv4mapped && \ 908bd670b35SErik Nordmark IN6_IS_ADDR_UNSPECIFIED(&next->conn_laddr_v6) && \ 9097c478bd9Sstevel@tonic-gate connp->conn_zoneid == next->conn_zoneid) { \ 9107c478bd9Sstevel@tonic-gate (connp)->conn_next = next; \ 9117c478bd9Sstevel@tonic-gate if (prev != NULL) \ 9127c478bd9Sstevel@tonic-gate prev = next->conn_prev; \ 9137c478bd9Sstevel@tonic-gate next->conn_prev = (connp); \ 9147c478bd9Sstevel@tonic-gate break; \ 9157c478bd9Sstevel@tonic-gate } \ 9167c478bd9Sstevel@tonic-gate list = &next->conn_next; \ 9177c478bd9Sstevel@tonic-gate prev = next; \ 9187c478bd9Sstevel@tonic-gate } \ 9197c478bd9Sstevel@tonic-gate (connp)->conn_prev = prev; \ 9207c478bd9Sstevel@tonic-gate *list = (connp); \ 9217c478bd9Sstevel@tonic-gate (connp)->conn_fanout = (connfp); \ 9227c478bd9Sstevel@tonic-gate (connp)->conn_flags = ((connp)->conn_flags & ~IPCL_REMOVED) | \ 9237c478bd9Sstevel@tonic-gate IPCL_BOUND; \ 9247c478bd9Sstevel@tonic-gate CONN_INC_REF((connp)); \ 9257c478bd9Sstevel@tonic-gate mutex_exit(&(connfp)->connf_lock); \ 9267c478bd9Sstevel@tonic-gate } 9277c478bd9Sstevel@tonic-gate 9287c478bd9Sstevel@tonic-gate void 9297c478bd9Sstevel@tonic-gate ipcl_hash_insert_wildcard(connf_t *connfp, conn_t *connp) 9307c478bd9Sstevel@tonic-gate { 9317c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_WILDCARD(connfp, connp); 9327c478bd9Sstevel@tonic-gate } 9337c478bd9Sstevel@tonic-gate 9347c478bd9Sstevel@tonic-gate /* 9352b24ab6bSSebastien Roy * Because the classifier is used to classify inbound packets, the destination 9362b24ab6bSSebastien Roy * address is meant to be our local tunnel address (tunnel source), and the 9372b24ab6bSSebastien Roy * source the remote tunnel address (tunnel destination). 938bd670b35SErik Nordmark * 939bd670b35SErik Nordmark * Note that conn_proto can't be used for fanout since the upper protocol 940bd670b35SErik Nordmark * can be both 41 and 4 when IPv6 and IPv4 are over the same tunnel. 9412b24ab6bSSebastien Roy */ 9422b24ab6bSSebastien Roy conn_t * 9432b24ab6bSSebastien Roy ipcl_iptun_classify_v4(ipaddr_t *src, ipaddr_t *dst, ip_stack_t *ipst) 9442b24ab6bSSebastien Roy { 9452b24ab6bSSebastien Roy connf_t *connfp; 9462b24ab6bSSebastien Roy conn_t *connp; 9472b24ab6bSSebastien Roy 9482b24ab6bSSebastien Roy /* first look for IPv4 tunnel links */ 9492b24ab6bSSebastien Roy connfp = &ipst->ips_ipcl_iptun_fanout[IPCL_IPTUN_HASH(*dst, *src)]; 9502b24ab6bSSebastien Roy mutex_enter(&connfp->connf_lock); 9512b24ab6bSSebastien Roy for (connp = connfp->connf_head; connp != NULL; 9522b24ab6bSSebastien Roy connp = connp->conn_next) { 9532b24ab6bSSebastien Roy if (IPCL_IPTUN_MATCH(connp, *dst, *src)) 9542b24ab6bSSebastien Roy break; 9552b24ab6bSSebastien Roy } 9562b24ab6bSSebastien Roy if (connp != NULL) 9572b24ab6bSSebastien Roy goto done; 9582b24ab6bSSebastien Roy 9592b24ab6bSSebastien Roy mutex_exit(&connfp->connf_lock); 9602b24ab6bSSebastien Roy 9612b24ab6bSSebastien Roy /* We didn't find an IPv4 tunnel, try a 6to4 tunnel */ 9622b24ab6bSSebastien Roy connfp = &ipst->ips_ipcl_iptun_fanout[IPCL_IPTUN_HASH(*dst, 9632b24ab6bSSebastien Roy INADDR_ANY)]; 9642b24ab6bSSebastien Roy mutex_enter(&connfp->connf_lock); 9652b24ab6bSSebastien Roy for (connp = connfp->connf_head; connp != NULL; 9662b24ab6bSSebastien Roy connp = connp->conn_next) { 9672b24ab6bSSebastien Roy if (IPCL_IPTUN_MATCH(connp, *dst, INADDR_ANY)) 9682b24ab6bSSebastien Roy break; 9692b24ab6bSSebastien Roy } 9702b24ab6bSSebastien Roy done: 9712b24ab6bSSebastien Roy if (connp != NULL) 9722b24ab6bSSebastien Roy CONN_INC_REF(connp); 9732b24ab6bSSebastien Roy mutex_exit(&connfp->connf_lock); 9742b24ab6bSSebastien Roy return (connp); 9752b24ab6bSSebastien Roy } 9762b24ab6bSSebastien Roy 9772b24ab6bSSebastien Roy conn_t * 9782b24ab6bSSebastien Roy ipcl_iptun_classify_v6(in6_addr_t *src, in6_addr_t *dst, ip_stack_t *ipst) 9792b24ab6bSSebastien Roy { 9802b24ab6bSSebastien Roy connf_t *connfp; 9812b24ab6bSSebastien Roy conn_t *connp; 9822b24ab6bSSebastien Roy 9832b24ab6bSSebastien Roy /* Look for an IPv6 tunnel link */ 9842b24ab6bSSebastien Roy connfp = &ipst->ips_ipcl_iptun_fanout[IPCL_IPTUN_HASH_V6(dst, src)]; 9852b24ab6bSSebastien Roy mutex_enter(&connfp->connf_lock); 9862b24ab6bSSebastien Roy for (connp = connfp->connf_head; connp != NULL; 9872b24ab6bSSebastien Roy connp = connp->conn_next) { 9882b24ab6bSSebastien Roy if (IPCL_IPTUN_MATCH_V6(connp, dst, src)) { 9892b24ab6bSSebastien Roy CONN_INC_REF(connp); 9902b24ab6bSSebastien Roy break; 9912b24ab6bSSebastien Roy } 9922b24ab6bSSebastien Roy } 9932b24ab6bSSebastien Roy mutex_exit(&connfp->connf_lock); 9942b24ab6bSSebastien Roy return (connp); 9952b24ab6bSSebastien Roy } 9962b24ab6bSSebastien Roy 9972b24ab6bSSebastien Roy /* 9987c478bd9Sstevel@tonic-gate * This function is used only for inserting SCTP raw socket now. 9997c478bd9Sstevel@tonic-gate * This may change later. 10007c478bd9Sstevel@tonic-gate * 10017c478bd9Sstevel@tonic-gate * Note that only one raw socket can be bound to a port. The param 10027c478bd9Sstevel@tonic-gate * lport is in network byte order. 10037c478bd9Sstevel@tonic-gate */ 10047c478bd9Sstevel@tonic-gate static int 10057c478bd9Sstevel@tonic-gate ipcl_sctp_hash_insert(conn_t *connp, in_port_t lport) 10067c478bd9Sstevel@tonic-gate { 10077c478bd9Sstevel@tonic-gate connf_t *connfp; 10087c478bd9Sstevel@tonic-gate conn_t *oconnp; 1009f4b3ec61Sdh155122 ip_stack_t *ipst = connp->conn_netstack->netstack_ip; 10107c478bd9Sstevel@tonic-gate 1011f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_raw_fanout[IPCL_RAW_HASH(ntohs(lport), ipst)]; 10127c478bd9Sstevel@tonic-gate 10137c478bd9Sstevel@tonic-gate /* Check for existing raw socket already bound to the port. */ 10147c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 10157c478bd9Sstevel@tonic-gate for (oconnp = connfp->connf_head; oconnp != NULL; 10167c0c0508Skcpoon oconnp = oconnp->conn_next) { 10177c478bd9Sstevel@tonic-gate if (oconnp->conn_lport == lport && 10187c478bd9Sstevel@tonic-gate oconnp->conn_zoneid == connp->conn_zoneid && 1019bd670b35SErik Nordmark oconnp->conn_family == connp->conn_family && 1020bd670b35SErik Nordmark ((IN6_IS_ADDR_UNSPECIFIED(&connp->conn_laddr_v6) || 1021bd670b35SErik Nordmark IN6_IS_ADDR_UNSPECIFIED(&oconnp->conn_laddr_v6) || 1022bd670b35SErik Nordmark IN6_IS_ADDR_V4MAPPED_ANY(&connp->conn_laddr_v6) || 1023bd670b35SErik Nordmark IN6_IS_ADDR_V4MAPPED_ANY(&oconnp->conn_laddr_v6)) || 1024bd670b35SErik Nordmark IN6_ARE_ADDR_EQUAL(&oconnp->conn_laddr_v6, 1025bd670b35SErik Nordmark &connp->conn_laddr_v6))) { 10267c478bd9Sstevel@tonic-gate break; 10277c478bd9Sstevel@tonic-gate } 10287c478bd9Sstevel@tonic-gate } 10297c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 10307c478bd9Sstevel@tonic-gate if (oconnp != NULL) 10317c478bd9Sstevel@tonic-gate return (EADDRNOTAVAIL); 10327c478bd9Sstevel@tonic-gate 1033bd670b35SErik Nordmark if (IN6_IS_ADDR_UNSPECIFIED(&connp->conn_faddr_v6) || 1034bd670b35SErik Nordmark IN6_IS_ADDR_V4MAPPED_ANY(&connp->conn_faddr_v6)) { 1035bd670b35SErik Nordmark if (IN6_IS_ADDR_UNSPECIFIED(&connp->conn_laddr_v6) || 1036bd670b35SErik Nordmark IN6_IS_ADDR_V4MAPPED_ANY(&connp->conn_laddr_v6)) { 10377c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_WILDCARD(connfp, connp); 10387c478bd9Sstevel@tonic-gate } else { 10397c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_BOUND(connfp, connp); 10407c478bd9Sstevel@tonic-gate } 10417c478bd9Sstevel@tonic-gate } else { 10427c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_CONNECTED(connfp, connp); 10437c478bd9Sstevel@tonic-gate } 10447c478bd9Sstevel@tonic-gate return (0); 10457c478bd9Sstevel@tonic-gate } 10467c478bd9Sstevel@tonic-gate 10472b24ab6bSSebastien Roy static int 1048bd670b35SErik Nordmark ipcl_iptun_hash_insert(conn_t *connp, ip_stack_t *ipst) 10492b24ab6bSSebastien Roy { 10502b24ab6bSSebastien Roy connf_t *connfp; 10512b24ab6bSSebastien Roy conn_t *tconnp; 1052bd670b35SErik Nordmark ipaddr_t laddr = connp->conn_laddr_v4; 1053bd670b35SErik Nordmark ipaddr_t faddr = connp->conn_faddr_v4; 10542b24ab6bSSebastien Roy 1055bd670b35SErik Nordmark connfp = &ipst->ips_ipcl_iptun_fanout[IPCL_IPTUN_HASH(laddr, faddr)]; 10562b24ab6bSSebastien Roy mutex_enter(&connfp->connf_lock); 10572b24ab6bSSebastien Roy for (tconnp = connfp->connf_head; tconnp != NULL; 10582b24ab6bSSebastien Roy tconnp = tconnp->conn_next) { 1059bd670b35SErik Nordmark if (IPCL_IPTUN_MATCH(tconnp, laddr, faddr)) { 10602b24ab6bSSebastien Roy /* A tunnel is already bound to these addresses. */ 10612b24ab6bSSebastien Roy mutex_exit(&connfp->connf_lock); 10622b24ab6bSSebastien Roy return (EADDRINUSE); 10632b24ab6bSSebastien Roy } 10642b24ab6bSSebastien Roy } 10652b24ab6bSSebastien Roy IPCL_HASH_INSERT_CONNECTED_LOCKED(connfp, connp); 10662b24ab6bSSebastien Roy mutex_exit(&connfp->connf_lock); 10672b24ab6bSSebastien Roy return (0); 10682b24ab6bSSebastien Roy } 10692b24ab6bSSebastien Roy 10702b24ab6bSSebastien Roy static int 1071bd670b35SErik Nordmark ipcl_iptun_hash_insert_v6(conn_t *connp, ip_stack_t *ipst) 10722b24ab6bSSebastien Roy { 10732b24ab6bSSebastien Roy connf_t *connfp; 10742b24ab6bSSebastien Roy conn_t *tconnp; 1075bd670b35SErik Nordmark in6_addr_t *laddr = &connp->conn_laddr_v6; 1076bd670b35SErik Nordmark in6_addr_t *faddr = &connp->conn_faddr_v6; 10772b24ab6bSSebastien Roy 1078bd670b35SErik Nordmark connfp = &ipst->ips_ipcl_iptun_fanout[IPCL_IPTUN_HASH_V6(laddr, faddr)]; 10792b24ab6bSSebastien Roy mutex_enter(&connfp->connf_lock); 10802b24ab6bSSebastien Roy for (tconnp = connfp->connf_head; tconnp != NULL; 10812b24ab6bSSebastien Roy tconnp = tconnp->conn_next) { 1082bd670b35SErik Nordmark if (IPCL_IPTUN_MATCH_V6(tconnp, laddr, faddr)) { 10832b24ab6bSSebastien Roy /* A tunnel is already bound to these addresses. */ 10842b24ab6bSSebastien Roy mutex_exit(&connfp->connf_lock); 10852b24ab6bSSebastien Roy return (EADDRINUSE); 10862b24ab6bSSebastien Roy } 10872b24ab6bSSebastien Roy } 10882b24ab6bSSebastien Roy IPCL_HASH_INSERT_CONNECTED_LOCKED(connfp, connp); 10892b24ab6bSSebastien Roy mutex_exit(&connfp->connf_lock); 10902b24ab6bSSebastien Roy return (0); 10912b24ab6bSSebastien Roy } 10922b24ab6bSSebastien Roy 10937c478bd9Sstevel@tonic-gate /* 109445916cd2Sjpk * Check for a MAC exemption conflict on a labeled system. Note that for 109545916cd2Sjpk * protocols that use port numbers (UDP, TCP, SCTP), we do this check up in the 109645916cd2Sjpk * transport layer. This check is for binding all other protocols. 109745916cd2Sjpk * 109845916cd2Sjpk * Returns true if there's a conflict. 109945916cd2Sjpk */ 110045916cd2Sjpk static boolean_t 1101f4b3ec61Sdh155122 check_exempt_conflict_v4(conn_t *connp, ip_stack_t *ipst) 110245916cd2Sjpk { 110345916cd2Sjpk connf_t *connfp; 110445916cd2Sjpk conn_t *tconn; 110545916cd2Sjpk 1106bd670b35SErik Nordmark connfp = &ipst->ips_ipcl_proto_fanout_v4[connp->conn_proto]; 110745916cd2Sjpk mutex_enter(&connfp->connf_lock); 110845916cd2Sjpk for (tconn = connfp->connf_head; tconn != NULL; 110945916cd2Sjpk tconn = tconn->conn_next) { 111045916cd2Sjpk /* We don't allow v4 fallback for v6 raw socket */ 1111bd670b35SErik Nordmark if (connp->conn_family != tconn->conn_family) 111245916cd2Sjpk continue; 111345916cd2Sjpk /* If neither is exempt, then there's no conflict */ 11145d3b8cb7SBill Sommerfeld if ((connp->conn_mac_mode == CONN_MAC_DEFAULT) && 11155d3b8cb7SBill Sommerfeld (tconn->conn_mac_mode == CONN_MAC_DEFAULT)) 111645916cd2Sjpk continue; 11175f9878b0Sken Powell - Sun Microsystem /* We are only concerned about sockets for a different zone */ 11185f9878b0Sken Powell - Sun Microsystem if (connp->conn_zoneid == tconn->conn_zoneid) 11195f9878b0Sken Powell - Sun Microsystem continue; 112045916cd2Sjpk /* If both are bound to different specific addrs, ok */ 1121bd670b35SErik Nordmark if (connp->conn_laddr_v4 != INADDR_ANY && 1122bd670b35SErik Nordmark tconn->conn_laddr_v4 != INADDR_ANY && 1123bd670b35SErik Nordmark connp->conn_laddr_v4 != tconn->conn_laddr_v4) 112445916cd2Sjpk continue; 112545916cd2Sjpk /* These two conflict; fail */ 112645916cd2Sjpk break; 112745916cd2Sjpk } 112845916cd2Sjpk mutex_exit(&connfp->connf_lock); 112945916cd2Sjpk return (tconn != NULL); 113045916cd2Sjpk } 113145916cd2Sjpk 113245916cd2Sjpk static boolean_t 1133f4b3ec61Sdh155122 check_exempt_conflict_v6(conn_t *connp, ip_stack_t *ipst) 113445916cd2Sjpk { 113545916cd2Sjpk connf_t *connfp; 113645916cd2Sjpk conn_t *tconn; 113745916cd2Sjpk 1138bd670b35SErik Nordmark connfp = &ipst->ips_ipcl_proto_fanout_v6[connp->conn_proto]; 113945916cd2Sjpk mutex_enter(&connfp->connf_lock); 114045916cd2Sjpk for (tconn = connfp->connf_head; tconn != NULL; 114145916cd2Sjpk tconn = tconn->conn_next) { 114245916cd2Sjpk /* We don't allow v4 fallback for v6 raw socket */ 1143bd670b35SErik Nordmark if (connp->conn_family != tconn->conn_family) 114445916cd2Sjpk continue; 114545916cd2Sjpk /* If neither is exempt, then there's no conflict */ 11465d3b8cb7SBill Sommerfeld if ((connp->conn_mac_mode == CONN_MAC_DEFAULT) && 11475d3b8cb7SBill Sommerfeld (tconn->conn_mac_mode == CONN_MAC_DEFAULT)) 114845916cd2Sjpk continue; 11495f9878b0Sken Powell - Sun Microsystem /* We are only concerned about sockets for a different zone */ 11505f9878b0Sken Powell - Sun Microsystem if (connp->conn_zoneid == tconn->conn_zoneid) 11515f9878b0Sken Powell - Sun Microsystem continue; 115245916cd2Sjpk /* If both are bound to different addrs, ok */ 1153bd670b35SErik Nordmark if (!IN6_IS_ADDR_UNSPECIFIED(&connp->conn_laddr_v6) && 1154bd670b35SErik Nordmark !IN6_IS_ADDR_UNSPECIFIED(&tconn->conn_laddr_v6) && 1155bd670b35SErik Nordmark !IN6_ARE_ADDR_EQUAL(&connp->conn_laddr_v6, 1156bd670b35SErik Nordmark &tconn->conn_laddr_v6)) 115745916cd2Sjpk continue; 115845916cd2Sjpk /* These two conflict; fail */ 115945916cd2Sjpk break; 116045916cd2Sjpk } 116145916cd2Sjpk mutex_exit(&connfp->connf_lock); 116245916cd2Sjpk return (tconn != NULL); 116345916cd2Sjpk } 116445916cd2Sjpk 116545916cd2Sjpk /* 11667c478bd9Sstevel@tonic-gate * (v4, v6) bind hash insertion routines 1167bd670b35SErik Nordmark * The caller has already setup the conn (conn_proto, conn_laddr_v6, conn_lport) 11687c478bd9Sstevel@tonic-gate */ 1169bd670b35SErik Nordmark 11707c478bd9Sstevel@tonic-gate int 1171bd670b35SErik Nordmark ipcl_bind_insert(conn_t *connp) 1172bd670b35SErik Nordmark { 1173bd670b35SErik Nordmark if (connp->conn_ipversion == IPV6_VERSION) 1174bd670b35SErik Nordmark return (ipcl_bind_insert_v6(connp)); 1175bd670b35SErik Nordmark else 1176bd670b35SErik Nordmark return (ipcl_bind_insert_v4(connp)); 1177bd670b35SErik Nordmark } 1178bd670b35SErik Nordmark 1179bd670b35SErik Nordmark int 1180bd670b35SErik Nordmark ipcl_bind_insert_v4(conn_t *connp) 11817c478bd9Sstevel@tonic-gate { 11827c478bd9Sstevel@tonic-gate connf_t *connfp; 11837c478bd9Sstevel@tonic-gate int ret = 0; 1184f4b3ec61Sdh155122 ip_stack_t *ipst = connp->conn_netstack->netstack_ip; 1185bd670b35SErik Nordmark uint16_t lport = connp->conn_lport; 1186bd670b35SErik Nordmark uint8_t protocol = connp->conn_proto; 11877c478bd9Sstevel@tonic-gate 11882b24ab6bSSebastien Roy if (IPCL_IS_IPTUN(connp)) 1189bd670b35SErik Nordmark return (ipcl_iptun_hash_insert(connp, ipst)); 11902b24ab6bSSebastien Roy 11917c478bd9Sstevel@tonic-gate switch (protocol) { 11927c478bd9Sstevel@tonic-gate default: 1193f4b3ec61Sdh155122 if (is_system_labeled() && 1194f4b3ec61Sdh155122 check_exempt_conflict_v4(connp, ipst)) 119545916cd2Sjpk return (EADDRINUSE); 119645916cd2Sjpk /* FALLTHROUGH */ 119745916cd2Sjpk case IPPROTO_UDP: 11987c478bd9Sstevel@tonic-gate if (protocol == IPPROTO_UDP) { 1199f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_udp_fanout[ 1200f4b3ec61Sdh155122 IPCL_UDP_HASH(lport, ipst)]; 12017c478bd9Sstevel@tonic-gate } else { 1202bd670b35SErik Nordmark connfp = &ipst->ips_ipcl_proto_fanout_v4[protocol]; 12037c478bd9Sstevel@tonic-gate } 12047c478bd9Sstevel@tonic-gate 1205bd670b35SErik Nordmark if (connp->conn_faddr_v4 != INADDR_ANY) { 12067c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_CONNECTED(connfp, connp); 1207bd670b35SErik Nordmark } else if (connp->conn_laddr_v4 != INADDR_ANY) { 12087c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_BOUND(connfp, connp); 12097c478bd9Sstevel@tonic-gate } else { 12107c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_WILDCARD(connfp, connp); 12117c478bd9Sstevel@tonic-gate } 1212bd670b35SErik Nordmark if (protocol == IPPROTO_RSVP) 1213bd670b35SErik Nordmark ill_set_inputfn_all(ipst); 12147c478bd9Sstevel@tonic-gate break; 12157c478bd9Sstevel@tonic-gate 12167c478bd9Sstevel@tonic-gate case IPPROTO_TCP: 12177c478bd9Sstevel@tonic-gate /* Insert it in the Bind Hash */ 121845916cd2Sjpk ASSERT(connp->conn_zoneid != ALL_ZONES); 1219f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_bind_fanout[ 1220f4b3ec61Sdh155122 IPCL_BIND_HASH(lport, ipst)]; 1221bd670b35SErik Nordmark if (connp->conn_laddr_v4 != INADDR_ANY) { 12227c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_BOUND(connfp, connp); 12237c478bd9Sstevel@tonic-gate } else { 12247c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_WILDCARD(connfp, connp); 12257c478bd9Sstevel@tonic-gate } 12267c478bd9Sstevel@tonic-gate if (cl_inet_listen != NULL) { 1227bd670b35SErik Nordmark ASSERT(connp->conn_ipversion == IPV4_VERSION); 12287c478bd9Sstevel@tonic-gate connp->conn_flags |= IPCL_CL_LISTENER; 12298e4b770fSLu Huafeng (*cl_inet_listen)( 12308e4b770fSLu Huafeng connp->conn_netstack->netstack_stackid, 12318e4b770fSLu Huafeng IPPROTO_TCP, AF_INET, 1232bd670b35SErik Nordmark (uint8_t *)&connp->conn_bound_addr_v4, lport, NULL); 12337c478bd9Sstevel@tonic-gate } 12347c478bd9Sstevel@tonic-gate break; 12357c478bd9Sstevel@tonic-gate 12367c478bd9Sstevel@tonic-gate case IPPROTO_SCTP: 12377c478bd9Sstevel@tonic-gate ret = ipcl_sctp_hash_insert(connp, lport); 12387c478bd9Sstevel@tonic-gate break; 12397c478bd9Sstevel@tonic-gate } 12407c478bd9Sstevel@tonic-gate 12417c478bd9Sstevel@tonic-gate return (ret); 12427c478bd9Sstevel@tonic-gate } 12437c478bd9Sstevel@tonic-gate 12447c478bd9Sstevel@tonic-gate int 1245bd670b35SErik Nordmark ipcl_bind_insert_v6(conn_t *connp) 12467c478bd9Sstevel@tonic-gate { 12477c478bd9Sstevel@tonic-gate connf_t *connfp; 12487c478bd9Sstevel@tonic-gate int ret = 0; 1249f4b3ec61Sdh155122 ip_stack_t *ipst = connp->conn_netstack->netstack_ip; 1250bd670b35SErik Nordmark uint16_t lport = connp->conn_lport; 1251bd670b35SErik Nordmark uint8_t protocol = connp->conn_proto; 12527c478bd9Sstevel@tonic-gate 12532b24ab6bSSebastien Roy if (IPCL_IS_IPTUN(connp)) { 1254bd670b35SErik Nordmark return (ipcl_iptun_hash_insert_v6(connp, ipst)); 12552b24ab6bSSebastien Roy } 12562b24ab6bSSebastien Roy 12577c478bd9Sstevel@tonic-gate switch (protocol) { 12587c478bd9Sstevel@tonic-gate default: 1259f4b3ec61Sdh155122 if (is_system_labeled() && 1260f4b3ec61Sdh155122 check_exempt_conflict_v6(connp, ipst)) 126145916cd2Sjpk return (EADDRINUSE); 126245916cd2Sjpk /* FALLTHROUGH */ 126345916cd2Sjpk case IPPROTO_UDP: 12647c478bd9Sstevel@tonic-gate if (protocol == IPPROTO_UDP) { 1265f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_udp_fanout[ 1266f4b3ec61Sdh155122 IPCL_UDP_HASH(lport, ipst)]; 12677c478bd9Sstevel@tonic-gate } else { 1268f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_proto_fanout_v6[protocol]; 12697c478bd9Sstevel@tonic-gate } 12707c478bd9Sstevel@tonic-gate 1271bd670b35SErik Nordmark if (!IN6_IS_ADDR_UNSPECIFIED(&connp->conn_faddr_v6)) { 12727c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_CONNECTED(connfp, connp); 1273bd670b35SErik Nordmark } else if (!IN6_IS_ADDR_UNSPECIFIED(&connp->conn_laddr_v6)) { 12747c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_BOUND(connfp, connp); 12757c478bd9Sstevel@tonic-gate } else { 12767c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_WILDCARD(connfp, connp); 12777c478bd9Sstevel@tonic-gate } 12787c478bd9Sstevel@tonic-gate break; 12797c478bd9Sstevel@tonic-gate 12807c478bd9Sstevel@tonic-gate case IPPROTO_TCP: 12817c478bd9Sstevel@tonic-gate /* Insert it in the Bind Hash */ 128245916cd2Sjpk ASSERT(connp->conn_zoneid != ALL_ZONES); 1283f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_bind_fanout[ 1284f4b3ec61Sdh155122 IPCL_BIND_HASH(lport, ipst)]; 1285bd670b35SErik Nordmark if (!IN6_IS_ADDR_UNSPECIFIED(&connp->conn_laddr_v6)) { 12867c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_BOUND(connfp, connp); 12877c478bd9Sstevel@tonic-gate } else { 12887c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_WILDCARD(connfp, connp); 12897c478bd9Sstevel@tonic-gate } 12907c478bd9Sstevel@tonic-gate if (cl_inet_listen != NULL) { 12917c478bd9Sstevel@tonic-gate sa_family_t addr_family; 12927c478bd9Sstevel@tonic-gate uint8_t *laddrp; 12937c478bd9Sstevel@tonic-gate 1294bd670b35SErik Nordmark if (connp->conn_ipversion == IPV6_VERSION) { 12957c478bd9Sstevel@tonic-gate addr_family = AF_INET6; 12967c478bd9Sstevel@tonic-gate laddrp = 1297bd670b35SErik Nordmark (uint8_t *)&connp->conn_bound_addr_v6; 12987c478bd9Sstevel@tonic-gate } else { 12997c478bd9Sstevel@tonic-gate addr_family = AF_INET; 1300bd670b35SErik Nordmark laddrp = (uint8_t *)&connp->conn_bound_addr_v4; 13017c478bd9Sstevel@tonic-gate } 13027c478bd9Sstevel@tonic-gate connp->conn_flags |= IPCL_CL_LISTENER; 13038e4b770fSLu Huafeng (*cl_inet_listen)( 13048e4b770fSLu Huafeng connp->conn_netstack->netstack_stackid, 13058e4b770fSLu Huafeng IPPROTO_TCP, addr_family, laddrp, lport, NULL); 13067c478bd9Sstevel@tonic-gate } 13077c478bd9Sstevel@tonic-gate break; 13087c478bd9Sstevel@tonic-gate 13097c478bd9Sstevel@tonic-gate case IPPROTO_SCTP: 13107c478bd9Sstevel@tonic-gate ret = ipcl_sctp_hash_insert(connp, lport); 13117c478bd9Sstevel@tonic-gate break; 13127c478bd9Sstevel@tonic-gate } 13137c478bd9Sstevel@tonic-gate 13147c478bd9Sstevel@tonic-gate return (ret); 13157c478bd9Sstevel@tonic-gate } 13167c478bd9Sstevel@tonic-gate 13177c478bd9Sstevel@tonic-gate /* 13187c478bd9Sstevel@tonic-gate * ipcl_conn_hash insertion routines. 1319bd670b35SErik Nordmark * The caller has already set conn_proto and the addresses/ports in the conn_t. 13207c478bd9Sstevel@tonic-gate */ 1321bd670b35SErik Nordmark 13227c478bd9Sstevel@tonic-gate int 1323bd670b35SErik Nordmark ipcl_conn_insert(conn_t *connp) 1324bd670b35SErik Nordmark { 1325bd670b35SErik Nordmark if (connp->conn_ipversion == IPV6_VERSION) 1326bd670b35SErik Nordmark return (ipcl_conn_insert_v6(connp)); 1327bd670b35SErik Nordmark else 1328bd670b35SErik Nordmark return (ipcl_conn_insert_v4(connp)); 1329bd670b35SErik Nordmark } 1330bd670b35SErik Nordmark 1331bd670b35SErik Nordmark int 1332bd670b35SErik Nordmark ipcl_conn_insert_v4(conn_t *connp) 13337c478bd9Sstevel@tonic-gate { 13347c478bd9Sstevel@tonic-gate connf_t *connfp; 13357c478bd9Sstevel@tonic-gate conn_t *tconnp; 13367c478bd9Sstevel@tonic-gate int ret = 0; 1337f4b3ec61Sdh155122 ip_stack_t *ipst = connp->conn_netstack->netstack_ip; 1338bd670b35SErik Nordmark uint16_t lport = connp->conn_lport; 1339bd670b35SErik Nordmark uint8_t protocol = connp->conn_proto; 13407c478bd9Sstevel@tonic-gate 13412b24ab6bSSebastien Roy if (IPCL_IS_IPTUN(connp)) 1342bd670b35SErik Nordmark return (ipcl_iptun_hash_insert(connp, ipst)); 13432b24ab6bSSebastien Roy 13447c478bd9Sstevel@tonic-gate switch (protocol) { 13457c478bd9Sstevel@tonic-gate case IPPROTO_TCP: 13467c478bd9Sstevel@tonic-gate /* 1347bd670b35SErik Nordmark * For TCP, we check whether the connection tuple already 1348a12220b3SJon Anderson * exists before allowing the connection to proceed. We 1349a12220b3SJon Anderson * also allow indexing on the zoneid. This is to allow 1350a12220b3SJon Anderson * multiple shared stack zones to have the same tcp 1351a12220b3SJon Anderson * connection tuple. In practice this only happens for 1352a12220b3SJon Anderson * INADDR_LOOPBACK as it's the only local address which 1353a12220b3SJon Anderson * doesn't have to be unique. 1354a12220b3SJon Anderson */ 1355f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_conn_fanout[ 1356bd670b35SErik Nordmark IPCL_CONN_HASH(connp->conn_faddr_v4, 1357f4b3ec61Sdh155122 connp->conn_ports, ipst)]; 13587c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 13597c478bd9Sstevel@tonic-gate for (tconnp = connfp->connf_head; tconnp != NULL; 13607c478bd9Sstevel@tonic-gate tconnp = tconnp->conn_next) { 1361bd670b35SErik Nordmark if (IPCL_CONN_MATCH(tconnp, connp->conn_proto, 1362bd670b35SErik Nordmark connp->conn_faddr_v4, connp->conn_laddr_v4, 1363bd670b35SErik Nordmark connp->conn_ports) && 1364bd670b35SErik Nordmark IPCL_ZONE_MATCH(tconnp, connp->conn_zoneid)) { 13657c478bd9Sstevel@tonic-gate /* Already have a conn. bail out */ 13667c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 13677c478bd9Sstevel@tonic-gate return (EADDRINUSE); 13687c478bd9Sstevel@tonic-gate } 13697c478bd9Sstevel@tonic-gate } 13707c478bd9Sstevel@tonic-gate if (connp->conn_fanout != NULL) { 13717c478bd9Sstevel@tonic-gate /* 13727c478bd9Sstevel@tonic-gate * Probably a XTI/TLI application trying to do a 13737c478bd9Sstevel@tonic-gate * rebind. Let it happen. 13747c478bd9Sstevel@tonic-gate */ 13757c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 13767c478bd9Sstevel@tonic-gate IPCL_HASH_REMOVE(connp); 13777c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 13787c478bd9Sstevel@tonic-gate } 1379866ba9ddSjprakash 1380866ba9ddSjprakash ASSERT(connp->conn_recv != NULL); 1381bd670b35SErik Nordmark ASSERT(connp->conn_recvicmp != NULL); 1382866ba9ddSjprakash 13837c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_CONNECTED_LOCKED(connfp, connp); 13847c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 13857c478bd9Sstevel@tonic-gate break; 13867c478bd9Sstevel@tonic-gate 13877c478bd9Sstevel@tonic-gate case IPPROTO_SCTP: 13887c0c0508Skcpoon /* 13897c0c0508Skcpoon * The raw socket may have already been bound, remove it 13907c0c0508Skcpoon * from the hash first. 13917c0c0508Skcpoon */ 13927c0c0508Skcpoon IPCL_HASH_REMOVE(connp); 13937c478bd9Sstevel@tonic-gate ret = ipcl_sctp_hash_insert(connp, lport); 13947c478bd9Sstevel@tonic-gate break; 13957c478bd9Sstevel@tonic-gate 13967c478bd9Sstevel@tonic-gate default: 139745916cd2Sjpk /* 139845916cd2Sjpk * Check for conflicts among MAC exempt bindings. For 139945916cd2Sjpk * transports with port numbers, this is done by the upper 140045916cd2Sjpk * level per-transport binding logic. For all others, it's 140145916cd2Sjpk * done here. 140245916cd2Sjpk */ 1403f4b3ec61Sdh155122 if (is_system_labeled() && 1404f4b3ec61Sdh155122 check_exempt_conflict_v4(connp, ipst)) 140545916cd2Sjpk return (EADDRINUSE); 140645916cd2Sjpk /* FALLTHROUGH */ 140745916cd2Sjpk 140845916cd2Sjpk case IPPROTO_UDP: 14097c478bd9Sstevel@tonic-gate if (protocol == IPPROTO_UDP) { 1410f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_udp_fanout[ 1411bd670b35SErik Nordmark IPCL_UDP_HASH(lport, ipst)]; 14127c478bd9Sstevel@tonic-gate } else { 1413bd670b35SErik Nordmark connfp = &ipst->ips_ipcl_proto_fanout_v4[protocol]; 14147c478bd9Sstevel@tonic-gate } 14157c478bd9Sstevel@tonic-gate 1416bd670b35SErik Nordmark if (connp->conn_faddr_v4 != INADDR_ANY) { 14177c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_CONNECTED(connfp, connp); 1418bd670b35SErik Nordmark } else if (connp->conn_laddr_v4 != INADDR_ANY) { 14197c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_BOUND(connfp, connp); 14207c478bd9Sstevel@tonic-gate } else { 14217c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_WILDCARD(connfp, connp); 14227c478bd9Sstevel@tonic-gate } 14237c478bd9Sstevel@tonic-gate break; 14247c478bd9Sstevel@tonic-gate } 14257c478bd9Sstevel@tonic-gate 14267c478bd9Sstevel@tonic-gate return (ret); 14277c478bd9Sstevel@tonic-gate } 14287c478bd9Sstevel@tonic-gate 14297c478bd9Sstevel@tonic-gate int 1430bd670b35SErik Nordmark ipcl_conn_insert_v6(conn_t *connp) 14317c478bd9Sstevel@tonic-gate { 14327c478bd9Sstevel@tonic-gate connf_t *connfp; 14337c478bd9Sstevel@tonic-gate conn_t *tconnp; 14347c478bd9Sstevel@tonic-gate int ret = 0; 1435f4b3ec61Sdh155122 ip_stack_t *ipst = connp->conn_netstack->netstack_ip; 1436bd670b35SErik Nordmark uint16_t lport = connp->conn_lport; 1437bd670b35SErik Nordmark uint8_t protocol = connp->conn_proto; 1438bd670b35SErik Nordmark uint_t ifindex = connp->conn_bound_if; 14397c478bd9Sstevel@tonic-gate 14402b24ab6bSSebastien Roy if (IPCL_IS_IPTUN(connp)) 1441bd670b35SErik Nordmark return (ipcl_iptun_hash_insert_v6(connp, ipst)); 14422b24ab6bSSebastien Roy 14437c478bd9Sstevel@tonic-gate switch (protocol) { 14447c478bd9Sstevel@tonic-gate case IPPROTO_TCP: 1445a12220b3SJon Anderson 1446a12220b3SJon Anderson /* 1447a12220b3SJon Anderson * For tcp, we check whether the connection tuple already 1448a12220b3SJon Anderson * exists before allowing the connection to proceed. We 1449a12220b3SJon Anderson * also allow indexing on the zoneid. This is to allow 1450a12220b3SJon Anderson * multiple shared stack zones to have the same tcp 1451a12220b3SJon Anderson * connection tuple. In practice this only happens for 1452a12220b3SJon Anderson * ipv6_loopback as it's the only local address which 1453a12220b3SJon Anderson * doesn't have to be unique. 1454a12220b3SJon Anderson */ 1455f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_conn_fanout[ 1456bd670b35SErik Nordmark IPCL_CONN_HASH_V6(connp->conn_faddr_v6, connp->conn_ports, 1457f4b3ec61Sdh155122 ipst)]; 14587c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 14597c478bd9Sstevel@tonic-gate for (tconnp = connfp->connf_head; tconnp != NULL; 14607c478bd9Sstevel@tonic-gate tconnp = tconnp->conn_next) { 1461bd670b35SErik Nordmark /* NOTE: need to match zoneid. Bug in onnv-gate */ 1462bd670b35SErik Nordmark if (IPCL_CONN_MATCH_V6(tconnp, connp->conn_proto, 1463bd670b35SErik Nordmark connp->conn_faddr_v6, connp->conn_laddr_v6, 14647c478bd9Sstevel@tonic-gate connp->conn_ports) && 1465bd670b35SErik Nordmark (tconnp->conn_bound_if == 0 || 1466bd670b35SErik Nordmark tconnp->conn_bound_if == ifindex) && 1467bd670b35SErik Nordmark IPCL_ZONE_MATCH(tconnp, connp->conn_zoneid)) { 14687c478bd9Sstevel@tonic-gate /* Already have a conn. bail out */ 14697c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 14707c478bd9Sstevel@tonic-gate return (EADDRINUSE); 14717c478bd9Sstevel@tonic-gate } 14727c478bd9Sstevel@tonic-gate } 14737c478bd9Sstevel@tonic-gate if (connp->conn_fanout != NULL) { 14747c478bd9Sstevel@tonic-gate /* 14757c478bd9Sstevel@tonic-gate * Probably a XTI/TLI application trying to do a 14767c478bd9Sstevel@tonic-gate * rebind. Let it happen. 14777c478bd9Sstevel@tonic-gate */ 14787c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 14797c478bd9Sstevel@tonic-gate IPCL_HASH_REMOVE(connp); 14807c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 14817c478bd9Sstevel@tonic-gate } 14827c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_CONNECTED_LOCKED(connfp, connp); 14837c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 14847c478bd9Sstevel@tonic-gate break; 14857c478bd9Sstevel@tonic-gate 14867c478bd9Sstevel@tonic-gate case IPPROTO_SCTP: 14877c0c0508Skcpoon IPCL_HASH_REMOVE(connp); 14887c478bd9Sstevel@tonic-gate ret = ipcl_sctp_hash_insert(connp, lport); 14897c478bd9Sstevel@tonic-gate break; 14907c478bd9Sstevel@tonic-gate 14917c478bd9Sstevel@tonic-gate default: 1492f4b3ec61Sdh155122 if (is_system_labeled() && 1493f4b3ec61Sdh155122 check_exempt_conflict_v6(connp, ipst)) 149445916cd2Sjpk return (EADDRINUSE); 149545916cd2Sjpk /* FALLTHROUGH */ 149645916cd2Sjpk case IPPROTO_UDP: 14977c478bd9Sstevel@tonic-gate if (protocol == IPPROTO_UDP) { 1498f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_udp_fanout[ 1499bd670b35SErik Nordmark IPCL_UDP_HASH(lport, ipst)]; 15007c478bd9Sstevel@tonic-gate } else { 1501f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_proto_fanout_v6[protocol]; 15027c478bd9Sstevel@tonic-gate } 15037c478bd9Sstevel@tonic-gate 1504bd670b35SErik Nordmark if (!IN6_IS_ADDR_UNSPECIFIED(&connp->conn_faddr_v6)) { 15057c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_CONNECTED(connfp, connp); 1506bd670b35SErik Nordmark } else if (!IN6_IS_ADDR_UNSPECIFIED(&connp->conn_laddr_v6)) { 15077c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_BOUND(connfp, connp); 15087c478bd9Sstevel@tonic-gate } else { 15097c478bd9Sstevel@tonic-gate IPCL_HASH_INSERT_WILDCARD(connfp, connp); 15107c478bd9Sstevel@tonic-gate } 15117c478bd9Sstevel@tonic-gate break; 15127c478bd9Sstevel@tonic-gate } 15137c478bd9Sstevel@tonic-gate 15147c478bd9Sstevel@tonic-gate return (ret); 15157c478bd9Sstevel@tonic-gate } 15167c478bd9Sstevel@tonic-gate 15177c478bd9Sstevel@tonic-gate /* 15187c478bd9Sstevel@tonic-gate * v4 packet classifying function. looks up the fanout table to 15197c478bd9Sstevel@tonic-gate * find the conn, the packet belongs to. returns the conn with 15207c478bd9Sstevel@tonic-gate * the reference held, null otherwise. 152145916cd2Sjpk * 152245916cd2Sjpk * If zoneid is ALL_ZONES, then the search rules described in the "Connection 152345916cd2Sjpk * Lookup" comment block are applied. Labels are also checked as described 152445916cd2Sjpk * above. If the packet is from the inside (looped back), and is from the same 152545916cd2Sjpk * zone, then label checks are omitted. 15267c478bd9Sstevel@tonic-gate */ 15277c478bd9Sstevel@tonic-gate conn_t * 1528bd670b35SErik Nordmark ipcl_classify_v4(mblk_t *mp, uint8_t protocol, uint_t hdr_len, 1529bd670b35SErik Nordmark ip_recv_attr_t *ira, ip_stack_t *ipst) 15307c478bd9Sstevel@tonic-gate { 15317c478bd9Sstevel@tonic-gate ipha_t *ipha; 15327c478bd9Sstevel@tonic-gate connf_t *connfp, *bind_connfp; 15337c478bd9Sstevel@tonic-gate uint16_t lport; 15347c478bd9Sstevel@tonic-gate uint16_t fport; 15357c478bd9Sstevel@tonic-gate uint32_t ports; 15367c478bd9Sstevel@tonic-gate conn_t *connp; 15377c478bd9Sstevel@tonic-gate uint16_t *up; 1538bd670b35SErik Nordmark zoneid_t zoneid = ira->ira_zoneid; 15397c478bd9Sstevel@tonic-gate 15407c478bd9Sstevel@tonic-gate ipha = (ipha_t *)mp->b_rptr; 15417c478bd9Sstevel@tonic-gate up = (uint16_t *)((uchar_t *)ipha + hdr_len + TCP_PORTS_OFFSET); 15427c478bd9Sstevel@tonic-gate 15437c478bd9Sstevel@tonic-gate switch (protocol) { 15447c478bd9Sstevel@tonic-gate case IPPROTO_TCP: 15457c478bd9Sstevel@tonic-gate ports = *(uint32_t *)up; 15467c478bd9Sstevel@tonic-gate connfp = 1547f4b3ec61Sdh155122 &ipst->ips_ipcl_conn_fanout[IPCL_CONN_HASH(ipha->ipha_src, 1548f4b3ec61Sdh155122 ports, ipst)]; 15497c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 15507c478bd9Sstevel@tonic-gate for (connp = connfp->connf_head; connp != NULL; 15517c478bd9Sstevel@tonic-gate connp = connp->conn_next) { 1552bd670b35SErik Nordmark if (IPCL_CONN_MATCH(connp, protocol, 1553bd670b35SErik Nordmark ipha->ipha_src, ipha->ipha_dst, ports) && 1554bd670b35SErik Nordmark (connp->conn_zoneid == zoneid || 1555bd670b35SErik Nordmark connp->conn_allzones || 1556bd670b35SErik Nordmark ((connp->conn_mac_mode != CONN_MAC_DEFAULT) && 1557bd670b35SErik Nordmark (ira->ira_flags & IRAF_TX_MAC_EXEMPTABLE) && 1558bd670b35SErik Nordmark (ira->ira_flags & IRAF_TX_SHARED_ADDR)))) 15597c478bd9Sstevel@tonic-gate break; 15607c478bd9Sstevel@tonic-gate } 15617c478bd9Sstevel@tonic-gate 15627c478bd9Sstevel@tonic-gate if (connp != NULL) { 156345916cd2Sjpk /* 156445916cd2Sjpk * We have a fully-bound TCP connection. 156545916cd2Sjpk * 156645916cd2Sjpk * For labeled systems, there's no need to check the 156745916cd2Sjpk * label here. It's known to be good as we checked 156845916cd2Sjpk * before allowing the connection to become bound. 156945916cd2Sjpk */ 15707c478bd9Sstevel@tonic-gate CONN_INC_REF(connp); 15717c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 15727c478bd9Sstevel@tonic-gate return (connp); 15737c478bd9Sstevel@tonic-gate } 15747c478bd9Sstevel@tonic-gate 15757c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 15767c478bd9Sstevel@tonic-gate lport = up[1]; 1577f4b3ec61Sdh155122 bind_connfp = 1578f4b3ec61Sdh155122 &ipst->ips_ipcl_bind_fanout[IPCL_BIND_HASH(lport, ipst)]; 15797c478bd9Sstevel@tonic-gate mutex_enter(&bind_connfp->connf_lock); 15807c478bd9Sstevel@tonic-gate for (connp = bind_connfp->connf_head; connp != NULL; 15817c478bd9Sstevel@tonic-gate connp = connp->conn_next) { 158245916cd2Sjpk if (IPCL_BIND_MATCH(connp, protocol, ipha->ipha_dst, 1583bd670b35SErik Nordmark lport) && 1584bd670b35SErik Nordmark (connp->conn_zoneid == zoneid || 1585bd670b35SErik Nordmark connp->conn_allzones || 1586bd670b35SErik Nordmark ((connp->conn_mac_mode != CONN_MAC_DEFAULT) && 1587bd670b35SErik Nordmark (ira->ira_flags & IRAF_TX_MAC_EXEMPTABLE) && 1588bd670b35SErik Nordmark (ira->ira_flags & IRAF_TX_SHARED_ADDR)))) 15897c478bd9Sstevel@tonic-gate break; 15907c478bd9Sstevel@tonic-gate } 15917c478bd9Sstevel@tonic-gate 159245916cd2Sjpk /* 159345916cd2Sjpk * If the matching connection is SLP on a private address, then 159445916cd2Sjpk * the label on the packet must match the local zone's label. 159545916cd2Sjpk * Otherwise, it must be in the label range defined by tnrh. 1596bd670b35SErik Nordmark * This is ensured by tsol_receive_local. 1597bd670b35SErik Nordmark * 1598bd670b35SErik Nordmark * Note that we don't check tsol_receive_local for 1599bd670b35SErik Nordmark * the connected case. 160045916cd2Sjpk */ 1601bd670b35SErik Nordmark if (connp != NULL && (ira->ira_flags & IRAF_SYSTEM_LABELED) && 160245916cd2Sjpk !tsol_receive_local(mp, &ipha->ipha_dst, IPV4_VERSION, 1603bd670b35SErik Nordmark ira, connp)) { 1604bd670b35SErik Nordmark DTRACE_PROBE3(tx__ip__log__info__classify__tcp, 1605bd670b35SErik Nordmark char *, "connp(1) could not receive mp(2)", 160645916cd2Sjpk conn_t *, connp, mblk_t *, mp); 160745916cd2Sjpk connp = NULL; 160845916cd2Sjpk } 160945916cd2Sjpk 16107c478bd9Sstevel@tonic-gate if (connp != NULL) { 161145916cd2Sjpk /* Have a listener at least */ 16127c478bd9Sstevel@tonic-gate CONN_INC_REF(connp); 16137c478bd9Sstevel@tonic-gate mutex_exit(&bind_connfp->connf_lock); 16147c478bd9Sstevel@tonic-gate return (connp); 16157c478bd9Sstevel@tonic-gate } 16167c478bd9Sstevel@tonic-gate 16177c478bd9Sstevel@tonic-gate mutex_exit(&bind_connfp->connf_lock); 16187c478bd9Sstevel@tonic-gate break; 16197c478bd9Sstevel@tonic-gate 16207c478bd9Sstevel@tonic-gate case IPPROTO_UDP: 16217c478bd9Sstevel@tonic-gate lport = up[1]; 16227c478bd9Sstevel@tonic-gate fport = up[0]; 1623f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_udp_fanout[IPCL_UDP_HASH(lport, ipst)]; 16247c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 16257c478bd9Sstevel@tonic-gate for (connp = connfp->connf_head; connp != NULL; 16267c478bd9Sstevel@tonic-gate connp = connp->conn_next) { 16277c478bd9Sstevel@tonic-gate if (IPCL_UDP_MATCH(connp, lport, ipha->ipha_dst, 16287c478bd9Sstevel@tonic-gate fport, ipha->ipha_src) && 1629bd670b35SErik Nordmark (connp->conn_zoneid == zoneid || 1630bd670b35SErik Nordmark connp->conn_allzones || 1631bd670b35SErik Nordmark ((connp->conn_mac_mode != CONN_MAC_DEFAULT) && 1632bd670b35SErik Nordmark (ira->ira_flags & IRAF_TX_MAC_EXEMPTABLE)))) 16337c478bd9Sstevel@tonic-gate break; 16347c478bd9Sstevel@tonic-gate } 16357c478bd9Sstevel@tonic-gate 1636bd670b35SErik Nordmark if (connp != NULL && (ira->ira_flags & IRAF_SYSTEM_LABELED) && 163745916cd2Sjpk !tsol_receive_local(mp, &ipha->ipha_dst, IPV4_VERSION, 1638bd670b35SErik Nordmark ira, connp)) { 163945916cd2Sjpk DTRACE_PROBE3(tx__ip__log__info__classify__udp, 164045916cd2Sjpk char *, "connp(1) could not receive mp(2)", 164145916cd2Sjpk conn_t *, connp, mblk_t *, mp); 164245916cd2Sjpk connp = NULL; 164345916cd2Sjpk } 164445916cd2Sjpk 16457c478bd9Sstevel@tonic-gate if (connp != NULL) { 16467c478bd9Sstevel@tonic-gate CONN_INC_REF(connp); 16477c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 16487c478bd9Sstevel@tonic-gate return (connp); 16497c478bd9Sstevel@tonic-gate } 16507c478bd9Sstevel@tonic-gate 16517c478bd9Sstevel@tonic-gate /* 16527c478bd9Sstevel@tonic-gate * We shouldn't come here for multicast/broadcast packets 16537c478bd9Sstevel@tonic-gate */ 16547c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 1655bd670b35SErik Nordmark 16567c478bd9Sstevel@tonic-gate break; 16572b24ab6bSSebastien Roy 16582b24ab6bSSebastien Roy case IPPROTO_ENCAP: 16592b24ab6bSSebastien Roy case IPPROTO_IPV6: 16602b24ab6bSSebastien Roy return (ipcl_iptun_classify_v4(&ipha->ipha_src, 16612b24ab6bSSebastien Roy &ipha->ipha_dst, ipst)); 16627c478bd9Sstevel@tonic-gate } 16637c478bd9Sstevel@tonic-gate 16647c478bd9Sstevel@tonic-gate return (NULL); 16657c478bd9Sstevel@tonic-gate } 16667c478bd9Sstevel@tonic-gate 16677c478bd9Sstevel@tonic-gate conn_t * 1668bd670b35SErik Nordmark ipcl_classify_v6(mblk_t *mp, uint8_t protocol, uint_t hdr_len, 1669bd670b35SErik Nordmark ip_recv_attr_t *ira, ip_stack_t *ipst) 16707c478bd9Sstevel@tonic-gate { 16717c478bd9Sstevel@tonic-gate ip6_t *ip6h; 16727c478bd9Sstevel@tonic-gate connf_t *connfp, *bind_connfp; 16737c478bd9Sstevel@tonic-gate uint16_t lport; 16747c478bd9Sstevel@tonic-gate uint16_t fport; 1675bd670b35SErik Nordmark tcpha_t *tcpha; 16767c478bd9Sstevel@tonic-gate uint32_t ports; 16777c478bd9Sstevel@tonic-gate conn_t *connp; 16787c478bd9Sstevel@tonic-gate uint16_t *up; 1679bd670b35SErik Nordmark zoneid_t zoneid = ira->ira_zoneid; 16807c478bd9Sstevel@tonic-gate 16817c478bd9Sstevel@tonic-gate ip6h = (ip6_t *)mp->b_rptr; 16827c478bd9Sstevel@tonic-gate 16837c478bd9Sstevel@tonic-gate switch (protocol) { 16847c478bd9Sstevel@tonic-gate case IPPROTO_TCP: 1685bd670b35SErik Nordmark tcpha = (tcpha_t *)&mp->b_rptr[hdr_len]; 1686bd670b35SErik Nordmark up = &tcpha->tha_lport; 16877c478bd9Sstevel@tonic-gate ports = *(uint32_t *)up; 16887c478bd9Sstevel@tonic-gate 16897c478bd9Sstevel@tonic-gate connfp = 1690f4b3ec61Sdh155122 &ipst->ips_ipcl_conn_fanout[IPCL_CONN_HASH_V6(ip6h->ip6_src, 1691f4b3ec61Sdh155122 ports, ipst)]; 16927c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 16937c478bd9Sstevel@tonic-gate for (connp = connfp->connf_head; connp != NULL; 16947c478bd9Sstevel@tonic-gate connp = connp->conn_next) { 1695bd670b35SErik Nordmark if (IPCL_CONN_MATCH_V6(connp, protocol, 1696bd670b35SErik Nordmark ip6h->ip6_src, ip6h->ip6_dst, ports) && 1697bd670b35SErik Nordmark (connp->conn_zoneid == zoneid || 1698bd670b35SErik Nordmark connp->conn_allzones || 1699bd670b35SErik Nordmark ((connp->conn_mac_mode != CONN_MAC_DEFAULT) && 1700bd670b35SErik Nordmark (ira->ira_flags & IRAF_TX_MAC_EXEMPTABLE) && 1701bd670b35SErik Nordmark (ira->ira_flags & IRAF_TX_SHARED_ADDR)))) 17027c478bd9Sstevel@tonic-gate break; 17037c478bd9Sstevel@tonic-gate } 17047c478bd9Sstevel@tonic-gate 17057c478bd9Sstevel@tonic-gate if (connp != NULL) { 170645916cd2Sjpk /* 170745916cd2Sjpk * We have a fully-bound TCP connection. 170845916cd2Sjpk * 170945916cd2Sjpk * For labeled systems, there's no need to check the 171045916cd2Sjpk * label here. It's known to be good as we checked 171145916cd2Sjpk * before allowing the connection to become bound. 171245916cd2Sjpk */ 17137c478bd9Sstevel@tonic-gate CONN_INC_REF(connp); 17147c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 17157c478bd9Sstevel@tonic-gate return (connp); 17167c478bd9Sstevel@tonic-gate } 17177c478bd9Sstevel@tonic-gate 17187c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 17197c478bd9Sstevel@tonic-gate 17207c478bd9Sstevel@tonic-gate lport = up[1]; 1721f4b3ec61Sdh155122 bind_connfp = 1722f4b3ec61Sdh155122 &ipst->ips_ipcl_bind_fanout[IPCL_BIND_HASH(lport, ipst)]; 17237c478bd9Sstevel@tonic-gate mutex_enter(&bind_connfp->connf_lock); 17247c478bd9Sstevel@tonic-gate for (connp = bind_connfp->connf_head; connp != NULL; 17257c478bd9Sstevel@tonic-gate connp = connp->conn_next) { 17267c478bd9Sstevel@tonic-gate if (IPCL_BIND_MATCH_V6(connp, protocol, 17277c478bd9Sstevel@tonic-gate ip6h->ip6_dst, lport) && 1728bd670b35SErik Nordmark (connp->conn_zoneid == zoneid || 1729bd670b35SErik Nordmark connp->conn_allzones || 1730bd670b35SErik Nordmark ((connp->conn_mac_mode != CONN_MAC_DEFAULT) && 1731bd670b35SErik Nordmark (ira->ira_flags & IRAF_TX_MAC_EXEMPTABLE) && 1732bd670b35SErik Nordmark (ira->ira_flags & IRAF_TX_SHARED_ADDR)))) 17337c478bd9Sstevel@tonic-gate break; 17347c478bd9Sstevel@tonic-gate } 17357c478bd9Sstevel@tonic-gate 1736bd670b35SErik Nordmark if (connp != NULL && (ira->ira_flags & IRAF_SYSTEM_LABELED) && 173745916cd2Sjpk !tsol_receive_local(mp, &ip6h->ip6_dst, IPV6_VERSION, 1738bd670b35SErik Nordmark ira, connp)) { 173945916cd2Sjpk DTRACE_PROBE3(tx__ip__log__info__classify__tcp6, 174045916cd2Sjpk char *, "connp(1) could not receive mp(2)", 174145916cd2Sjpk conn_t *, connp, mblk_t *, mp); 174245916cd2Sjpk connp = NULL; 174345916cd2Sjpk } 174445916cd2Sjpk 17457c478bd9Sstevel@tonic-gate if (connp != NULL) { 17467c478bd9Sstevel@tonic-gate /* Have a listner at least */ 17477c478bd9Sstevel@tonic-gate CONN_INC_REF(connp); 17487c478bd9Sstevel@tonic-gate mutex_exit(&bind_connfp->connf_lock); 17497c478bd9Sstevel@tonic-gate return (connp); 17507c478bd9Sstevel@tonic-gate } 17517c478bd9Sstevel@tonic-gate 17527c478bd9Sstevel@tonic-gate mutex_exit(&bind_connfp->connf_lock); 17537c478bd9Sstevel@tonic-gate break; 17547c478bd9Sstevel@tonic-gate 17557c478bd9Sstevel@tonic-gate case IPPROTO_UDP: 17567c478bd9Sstevel@tonic-gate up = (uint16_t *)&mp->b_rptr[hdr_len]; 17577c478bd9Sstevel@tonic-gate lport = up[1]; 17587c478bd9Sstevel@tonic-gate fport = up[0]; 1759f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_udp_fanout[IPCL_UDP_HASH(lport, ipst)]; 17607c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 17617c478bd9Sstevel@tonic-gate for (connp = connfp->connf_head; connp != NULL; 17627c478bd9Sstevel@tonic-gate connp = connp->conn_next) { 17637c478bd9Sstevel@tonic-gate if (IPCL_UDP_MATCH_V6(connp, lport, ip6h->ip6_dst, 17647c478bd9Sstevel@tonic-gate fport, ip6h->ip6_src) && 1765bd670b35SErik Nordmark (connp->conn_zoneid == zoneid || 1766bd670b35SErik Nordmark connp->conn_allzones || 1767bd670b35SErik Nordmark ((connp->conn_mac_mode != CONN_MAC_DEFAULT) && 1768bd670b35SErik Nordmark (ira->ira_flags & IRAF_TX_MAC_EXEMPTABLE) && 1769bd670b35SErik Nordmark (ira->ira_flags & IRAF_TX_SHARED_ADDR)))) 17707c478bd9Sstevel@tonic-gate break; 17717c478bd9Sstevel@tonic-gate } 17727c478bd9Sstevel@tonic-gate 1773bd670b35SErik Nordmark if (connp != NULL && (ira->ira_flags & IRAF_SYSTEM_LABELED) && 177445916cd2Sjpk !tsol_receive_local(mp, &ip6h->ip6_dst, IPV6_VERSION, 1775bd670b35SErik Nordmark ira, connp)) { 177645916cd2Sjpk DTRACE_PROBE3(tx__ip__log__info__classify__udp6, 177745916cd2Sjpk char *, "connp(1) could not receive mp(2)", 177845916cd2Sjpk conn_t *, connp, mblk_t *, mp); 177945916cd2Sjpk connp = NULL; 178045916cd2Sjpk } 178145916cd2Sjpk 17827c478bd9Sstevel@tonic-gate if (connp != NULL) { 17837c478bd9Sstevel@tonic-gate CONN_INC_REF(connp); 17847c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 17857c478bd9Sstevel@tonic-gate return (connp); 17867c478bd9Sstevel@tonic-gate } 17877c478bd9Sstevel@tonic-gate 17887c478bd9Sstevel@tonic-gate /* 17897c478bd9Sstevel@tonic-gate * We shouldn't come here for multicast/broadcast packets 17907c478bd9Sstevel@tonic-gate */ 17917c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 17927c478bd9Sstevel@tonic-gate break; 17932b24ab6bSSebastien Roy case IPPROTO_ENCAP: 17942b24ab6bSSebastien Roy case IPPROTO_IPV6: 17952b24ab6bSSebastien Roy return (ipcl_iptun_classify_v6(&ip6h->ip6_src, 17962b24ab6bSSebastien Roy &ip6h->ip6_dst, ipst)); 17977c478bd9Sstevel@tonic-gate } 17987c478bd9Sstevel@tonic-gate 17997c478bd9Sstevel@tonic-gate return (NULL); 18007c478bd9Sstevel@tonic-gate } 18017c478bd9Sstevel@tonic-gate 18027c478bd9Sstevel@tonic-gate /* 18037c478bd9Sstevel@tonic-gate * wrapper around ipcl_classify_(v4,v6) routines. 18047c478bd9Sstevel@tonic-gate */ 18057c478bd9Sstevel@tonic-gate conn_t * 1806bd670b35SErik Nordmark ipcl_classify(mblk_t *mp, ip_recv_attr_t *ira, ip_stack_t *ipst) 18077c478bd9Sstevel@tonic-gate { 1808bd670b35SErik Nordmark if (ira->ira_flags & IRAF_IS_IPV4) { 1809bd670b35SErik Nordmark return (ipcl_classify_v4(mp, ira->ira_protocol, 1810bd670b35SErik Nordmark ira->ira_ip_hdr_length, ira, ipst)); 1811bd670b35SErik Nordmark } else { 1812bd670b35SErik Nordmark return (ipcl_classify_v6(mp, ira->ira_protocol, 1813bd670b35SErik Nordmark ira->ira_ip_hdr_length, ira, ipst)); 1814bd670b35SErik Nordmark } 18157c478bd9Sstevel@tonic-gate } 18167c478bd9Sstevel@tonic-gate 1817bd670b35SErik Nordmark /* 1818bd670b35SErik Nordmark * Only used to classify SCTP RAW sockets 1819bd670b35SErik Nordmark */ 18207c478bd9Sstevel@tonic-gate conn_t * 1821bd670b35SErik Nordmark ipcl_classify_raw(mblk_t *mp, uint8_t protocol, uint32_t ports, 1822bd670b35SErik Nordmark ipha_t *ipha, ip6_t *ip6h, ip_recv_attr_t *ira, ip_stack_t *ipst) 18237c478bd9Sstevel@tonic-gate { 182445916cd2Sjpk connf_t *connfp; 18257c478bd9Sstevel@tonic-gate conn_t *connp; 18267c478bd9Sstevel@tonic-gate in_port_t lport; 1827bd670b35SErik Nordmark int ipversion; 182845916cd2Sjpk const void *dst; 1829bd670b35SErik Nordmark zoneid_t zoneid = ira->ira_zoneid; 18307c478bd9Sstevel@tonic-gate 18317c478bd9Sstevel@tonic-gate lport = ((uint16_t *)&ports)[1]; 1832bd670b35SErik Nordmark if (ira->ira_flags & IRAF_IS_IPV4) { 1833bd670b35SErik Nordmark dst = (const void *)&ipha->ipha_dst; 1834bd670b35SErik Nordmark ipversion = IPV4_VERSION; 1835bd670b35SErik Nordmark } else { 1836bd670b35SErik Nordmark dst = (const void *)&ip6h->ip6_dst; 1837bd670b35SErik Nordmark ipversion = IPV6_VERSION; 183845916cd2Sjpk } 183945916cd2Sjpk 1840f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_raw_fanout[IPCL_RAW_HASH(ntohs(lport), ipst)]; 18417c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 18427c478bd9Sstevel@tonic-gate for (connp = connfp->connf_head; connp != NULL; 18437c478bd9Sstevel@tonic-gate connp = connp->conn_next) { 18447c478bd9Sstevel@tonic-gate /* We don't allow v4 fallback for v6 raw socket. */ 1845bd670b35SErik Nordmark if (ipversion != connp->conn_ipversion) 18467c478bd9Sstevel@tonic-gate continue; 1847bd670b35SErik Nordmark if (!IN6_IS_ADDR_UNSPECIFIED(&connp->conn_faddr_v6) && 1848bd670b35SErik Nordmark !IN6_IS_ADDR_V4MAPPED_ANY(&connp->conn_faddr_v6)) { 1849bd670b35SErik Nordmark if (ipversion == IPV4_VERSION) { 185045916cd2Sjpk if (!IPCL_CONN_MATCH(connp, protocol, 1851bd670b35SErik Nordmark ipha->ipha_src, ipha->ipha_dst, ports)) 185245916cd2Sjpk continue; 18537c478bd9Sstevel@tonic-gate } else { 185445916cd2Sjpk if (!IPCL_CONN_MATCH_V6(connp, protocol, 1855bd670b35SErik Nordmark ip6h->ip6_src, ip6h->ip6_dst, ports)) 185645916cd2Sjpk continue; 18577c478bd9Sstevel@tonic-gate } 18587c478bd9Sstevel@tonic-gate } else { 1859bd670b35SErik Nordmark if (ipversion == IPV4_VERSION) { 186045916cd2Sjpk if (!IPCL_BIND_MATCH(connp, protocol, 1861bd670b35SErik Nordmark ipha->ipha_dst, lport)) 186245916cd2Sjpk continue; 18637c478bd9Sstevel@tonic-gate } else { 186445916cd2Sjpk if (!IPCL_BIND_MATCH_V6(connp, protocol, 1865bd670b35SErik Nordmark ip6h->ip6_dst, lport)) 186645916cd2Sjpk continue; 186745916cd2Sjpk } 186845916cd2Sjpk } 186945916cd2Sjpk 1870bd670b35SErik Nordmark if (connp->conn_zoneid == zoneid || 1871bd670b35SErik Nordmark connp->conn_allzones || 1872bd670b35SErik Nordmark ((connp->conn_mac_mode != CONN_MAC_DEFAULT) && 1873bd670b35SErik Nordmark (ira->ira_flags & IRAF_TX_MAC_EXEMPTABLE) && 1874bd670b35SErik Nordmark (ira->ira_flags & IRAF_TX_SHARED_ADDR))) 18757c478bd9Sstevel@tonic-gate break; 18767c478bd9Sstevel@tonic-gate } 1877bd670b35SErik Nordmark 1878bd670b35SErik Nordmark if (connp != NULL && (ira->ira_flags & IRAF_SYSTEM_LABELED) && 1879bd670b35SErik Nordmark !tsol_receive_local(mp, dst, ipversion, ira, connp)) { 188045916cd2Sjpk DTRACE_PROBE3(tx__ip__log__info__classify__rawip, 188145916cd2Sjpk char *, "connp(1) could not receive mp(2)", 188245916cd2Sjpk conn_t *, connp, mblk_t *, mp); 188345916cd2Sjpk connp = NULL; 18847c478bd9Sstevel@tonic-gate } 18857c0c0508Skcpoon 18867c0c0508Skcpoon if (connp != NULL) 18877c0c0508Skcpoon goto found; 18887c0c0508Skcpoon mutex_exit(&connfp->connf_lock); 18897c0c0508Skcpoon 1890bd670b35SErik Nordmark /* Try to look for a wildcard SCTP RAW socket match. */ 1891f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_raw_fanout[IPCL_RAW_HASH(0, ipst)]; 18927c0c0508Skcpoon mutex_enter(&connfp->connf_lock); 18937c0c0508Skcpoon for (connp = connfp->connf_head; connp != NULL; 18947c0c0508Skcpoon connp = connp->conn_next) { 18957c0c0508Skcpoon /* We don't allow v4 fallback for v6 raw socket. */ 1896bd670b35SErik Nordmark if (ipversion != connp->conn_ipversion) 18977c0c0508Skcpoon continue; 1898bd670b35SErik Nordmark if (!IPCL_ZONE_MATCH(connp, zoneid)) 1899bd670b35SErik Nordmark continue; 1900bd670b35SErik Nordmark 1901bd670b35SErik Nordmark if (ipversion == IPV4_VERSION) { 1902bd670b35SErik Nordmark if (IPCL_RAW_MATCH(connp, protocol, ipha->ipha_dst)) 19037c0c0508Skcpoon break; 19047c0c0508Skcpoon } else { 1905bd670b35SErik Nordmark if (IPCL_RAW_MATCH_V6(connp, protocol, ip6h->ip6_dst)) { 19067c0c0508Skcpoon break; 19077c0c0508Skcpoon } 19087c0c0508Skcpoon } 19097c0c0508Skcpoon } 19107c0c0508Skcpoon 19117c0c0508Skcpoon if (connp != NULL) 19127c0c0508Skcpoon goto found; 19137c0c0508Skcpoon 19147c0c0508Skcpoon mutex_exit(&connfp->connf_lock); 19157c0c0508Skcpoon return (NULL); 19167c0c0508Skcpoon 19177c0c0508Skcpoon found: 19187c0c0508Skcpoon ASSERT(connp != NULL); 19197c478bd9Sstevel@tonic-gate CONN_INC_REF(connp); 19207c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 19217c478bd9Sstevel@tonic-gate return (connp); 19227c478bd9Sstevel@tonic-gate } 19237c478bd9Sstevel@tonic-gate 19247c478bd9Sstevel@tonic-gate /* ARGSUSED */ 19257c478bd9Sstevel@tonic-gate static int 1926fc80c0dfSnordmark tcp_conn_constructor(void *buf, void *cdrarg, int kmflags) 19277c478bd9Sstevel@tonic-gate { 19287c478bd9Sstevel@tonic-gate itc_t *itc = (itc_t *)buf; 19297c478bd9Sstevel@tonic-gate conn_t *connp = &itc->itc_conn; 1930fc80c0dfSnordmark tcp_t *tcp = (tcp_t *)&itc[1]; 1931fc80c0dfSnordmark 1932fc80c0dfSnordmark bzero(connp, sizeof (conn_t)); 1933fc80c0dfSnordmark bzero(tcp, sizeof (tcp_t)); 1934fc80c0dfSnordmark 1935fc80c0dfSnordmark mutex_init(&connp->conn_lock, NULL, MUTEX_DEFAULT, NULL); 1936fc80c0dfSnordmark cv_init(&connp->conn_cv, NULL, CV_DEFAULT, NULL); 19370f1702c5SYu Xiangning cv_init(&connp->conn_sq_cv, NULL, CV_DEFAULT, NULL); 1938bd670b35SErik Nordmark tcp->tcp_timercache = tcp_timermp_alloc(kmflags); 1939bd670b35SErik Nordmark if (tcp->tcp_timercache == NULL) 1940bd670b35SErik Nordmark return (ENOMEM); 19417c478bd9Sstevel@tonic-gate connp->conn_tcp = tcp; 19427c478bd9Sstevel@tonic-gate connp->conn_flags = IPCL_TCPCONN; 1943bd670b35SErik Nordmark connp->conn_proto = IPPROTO_TCP; 19447c478bd9Sstevel@tonic-gate tcp->tcp_connp = connp; 1945bd670b35SErik Nordmark rw_init(&connp->conn_ilg_lock, NULL, RW_DEFAULT, NULL); 1946bd670b35SErik Nordmark 1947bd670b35SErik Nordmark connp->conn_ixa = kmem_zalloc(sizeof (ip_xmit_attr_t), kmflags); 1948bd670b35SErik Nordmark if (connp->conn_ixa == NULL) { 1949bd670b35SErik Nordmark tcp_timermp_free(tcp); 1950bd670b35SErik Nordmark return (ENOMEM); 1951bd670b35SErik Nordmark } 1952bd670b35SErik Nordmark connp->conn_ixa->ixa_refcnt = 1; 1953bd670b35SErik Nordmark connp->conn_ixa->ixa_protocol = connp->conn_proto; 1954bd670b35SErik Nordmark connp->conn_ixa->ixa_xmit_hint = CONN_TO_XMIT_HINT(connp); 19557c478bd9Sstevel@tonic-gate return (0); 19567c478bd9Sstevel@tonic-gate } 19577c478bd9Sstevel@tonic-gate 19587c478bd9Sstevel@tonic-gate /* ARGSUSED */ 19597c478bd9Sstevel@tonic-gate static void 1960fc80c0dfSnordmark tcp_conn_destructor(void *buf, void *cdrarg) 19617c478bd9Sstevel@tonic-gate { 1962fc80c0dfSnordmark itc_t *itc = (itc_t *)buf; 1963fc80c0dfSnordmark conn_t *connp = &itc->itc_conn; 1964fc80c0dfSnordmark tcp_t *tcp = (tcp_t *)&itc[1]; 1965fc80c0dfSnordmark 1966fc80c0dfSnordmark ASSERT(connp->conn_flags & IPCL_TCPCONN); 1967fc80c0dfSnordmark ASSERT(tcp->tcp_connp == connp); 1968fc80c0dfSnordmark ASSERT(connp->conn_tcp == tcp); 1969fc80c0dfSnordmark tcp_timermp_free(tcp); 1970fc80c0dfSnordmark mutex_destroy(&connp->conn_lock); 1971fc80c0dfSnordmark cv_destroy(&connp->conn_cv); 19720f1702c5SYu Xiangning cv_destroy(&connp->conn_sq_cv); 1973bd670b35SErik Nordmark rw_destroy(&connp->conn_ilg_lock); 1974bd670b35SErik Nordmark 1975bd670b35SErik Nordmark /* Can be NULL if constructor failed */ 1976bd670b35SErik Nordmark if (connp->conn_ixa != NULL) { 1977bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_refcnt == 1); 1978bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_ire == NULL); 1979bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_nce == NULL); 1980bd670b35SErik Nordmark ixa_refrele(connp->conn_ixa); 1981bd670b35SErik Nordmark } 1982fc80c0dfSnordmark } 1983fc80c0dfSnordmark 1984fc80c0dfSnordmark /* ARGSUSED */ 1985fc80c0dfSnordmark static int 1986fc80c0dfSnordmark ip_conn_constructor(void *buf, void *cdrarg, int kmflags) 1987fc80c0dfSnordmark { 1988fc80c0dfSnordmark itc_t *itc = (itc_t *)buf; 1989fc80c0dfSnordmark conn_t *connp = &itc->itc_conn; 1990fc80c0dfSnordmark 1991fc80c0dfSnordmark bzero(connp, sizeof (conn_t)); 1992fc80c0dfSnordmark mutex_init(&connp->conn_lock, NULL, MUTEX_DEFAULT, NULL); 1993fc80c0dfSnordmark cv_init(&connp->conn_cv, NULL, CV_DEFAULT, NULL); 1994fc80c0dfSnordmark connp->conn_flags = IPCL_IPCCONN; 1995bd670b35SErik Nordmark rw_init(&connp->conn_ilg_lock, NULL, RW_DEFAULT, NULL); 1996fc80c0dfSnordmark 1997bd670b35SErik Nordmark connp->conn_ixa = kmem_zalloc(sizeof (ip_xmit_attr_t), kmflags); 1998bd670b35SErik Nordmark if (connp->conn_ixa == NULL) 1999bd670b35SErik Nordmark return (ENOMEM); 2000bd670b35SErik Nordmark connp->conn_ixa->ixa_refcnt = 1; 2001bd670b35SErik Nordmark connp->conn_ixa->ixa_xmit_hint = CONN_TO_XMIT_HINT(connp); 2002fc80c0dfSnordmark return (0); 2003fc80c0dfSnordmark } 2004fc80c0dfSnordmark 2005fc80c0dfSnordmark /* ARGSUSED */ 2006fc80c0dfSnordmark static void 2007fc80c0dfSnordmark ip_conn_destructor(void *buf, void *cdrarg) 2008fc80c0dfSnordmark { 2009fc80c0dfSnordmark itc_t *itc = (itc_t *)buf; 2010fc80c0dfSnordmark conn_t *connp = &itc->itc_conn; 2011fc80c0dfSnordmark 2012fc80c0dfSnordmark ASSERT(connp->conn_flags & IPCL_IPCCONN); 2013fc80c0dfSnordmark ASSERT(connp->conn_priv == NULL); 2014fc80c0dfSnordmark mutex_destroy(&connp->conn_lock); 2015fc80c0dfSnordmark cv_destroy(&connp->conn_cv); 2016bd670b35SErik Nordmark rw_destroy(&connp->conn_ilg_lock); 2017bd670b35SErik Nordmark 2018bd670b35SErik Nordmark /* Can be NULL if constructor failed */ 2019bd670b35SErik Nordmark if (connp->conn_ixa != NULL) { 2020bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_refcnt == 1); 2021bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_ire == NULL); 2022bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_nce == NULL); 2023bd670b35SErik Nordmark ixa_refrele(connp->conn_ixa); 2024bd670b35SErik Nordmark } 2025fc80c0dfSnordmark } 2026fc80c0dfSnordmark 2027fc80c0dfSnordmark /* ARGSUSED */ 2028fc80c0dfSnordmark static int 2029fc80c0dfSnordmark udp_conn_constructor(void *buf, void *cdrarg, int kmflags) 2030fc80c0dfSnordmark { 2031fc80c0dfSnordmark itc_t *itc = (itc_t *)buf; 2032fc80c0dfSnordmark conn_t *connp = &itc->itc_conn; 2033fc80c0dfSnordmark udp_t *udp = (udp_t *)&itc[1]; 2034fc80c0dfSnordmark 2035fc80c0dfSnordmark bzero(connp, sizeof (conn_t)); 2036fc80c0dfSnordmark bzero(udp, sizeof (udp_t)); 2037fc80c0dfSnordmark 2038fc80c0dfSnordmark mutex_init(&connp->conn_lock, NULL, MUTEX_DEFAULT, NULL); 2039fc80c0dfSnordmark cv_init(&connp->conn_cv, NULL, CV_DEFAULT, NULL); 2040fc80c0dfSnordmark connp->conn_udp = udp; 2041fc80c0dfSnordmark connp->conn_flags = IPCL_UDPCONN; 2042bd670b35SErik Nordmark connp->conn_proto = IPPROTO_UDP; 2043fc80c0dfSnordmark udp->udp_connp = connp; 2044bd670b35SErik Nordmark rw_init(&connp->conn_ilg_lock, NULL, RW_DEFAULT, NULL); 2045bd670b35SErik Nordmark connp->conn_ixa = kmem_zalloc(sizeof (ip_xmit_attr_t), kmflags); 2046bd670b35SErik Nordmark if (connp->conn_ixa == NULL) 2047bd670b35SErik Nordmark return (ENOMEM); 2048bd670b35SErik Nordmark connp->conn_ixa->ixa_refcnt = 1; 2049bd670b35SErik Nordmark connp->conn_ixa->ixa_protocol = connp->conn_proto; 2050bd670b35SErik Nordmark connp->conn_ixa->ixa_xmit_hint = CONN_TO_XMIT_HINT(connp); 2051fc80c0dfSnordmark return (0); 2052fc80c0dfSnordmark } 2053fc80c0dfSnordmark 2054fc80c0dfSnordmark /* ARGSUSED */ 2055fc80c0dfSnordmark static void 2056fc80c0dfSnordmark udp_conn_destructor(void *buf, void *cdrarg) 2057fc80c0dfSnordmark { 2058fc80c0dfSnordmark itc_t *itc = (itc_t *)buf; 2059fc80c0dfSnordmark conn_t *connp = &itc->itc_conn; 2060fc80c0dfSnordmark udp_t *udp = (udp_t *)&itc[1]; 2061fc80c0dfSnordmark 2062fc80c0dfSnordmark ASSERT(connp->conn_flags & IPCL_UDPCONN); 2063fc80c0dfSnordmark ASSERT(udp->udp_connp == connp); 2064fc80c0dfSnordmark ASSERT(connp->conn_udp == udp); 2065fc80c0dfSnordmark mutex_destroy(&connp->conn_lock); 2066fc80c0dfSnordmark cv_destroy(&connp->conn_cv); 2067bd670b35SErik Nordmark rw_destroy(&connp->conn_ilg_lock); 2068bd670b35SErik Nordmark 2069bd670b35SErik Nordmark /* Can be NULL if constructor failed */ 2070bd670b35SErik Nordmark if (connp->conn_ixa != NULL) { 2071bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_refcnt == 1); 2072bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_ire == NULL); 2073bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_nce == NULL); 2074bd670b35SErik Nordmark ixa_refrele(connp->conn_ixa); 2075bd670b35SErik Nordmark } 2076fc80c0dfSnordmark } 2077fc80c0dfSnordmark 2078fc80c0dfSnordmark /* ARGSUSED */ 2079fc80c0dfSnordmark static int 2080fc80c0dfSnordmark rawip_conn_constructor(void *buf, void *cdrarg, int kmflags) 2081fc80c0dfSnordmark { 2082fc80c0dfSnordmark itc_t *itc = (itc_t *)buf; 2083fc80c0dfSnordmark conn_t *connp = &itc->itc_conn; 2084fc80c0dfSnordmark icmp_t *icmp = (icmp_t *)&itc[1]; 2085fc80c0dfSnordmark 2086fc80c0dfSnordmark bzero(connp, sizeof (conn_t)); 2087fc80c0dfSnordmark bzero(icmp, sizeof (icmp_t)); 2088fc80c0dfSnordmark 2089fc80c0dfSnordmark mutex_init(&connp->conn_lock, NULL, MUTEX_DEFAULT, NULL); 2090fc80c0dfSnordmark cv_init(&connp->conn_cv, NULL, CV_DEFAULT, NULL); 2091fc80c0dfSnordmark connp->conn_icmp = icmp; 2092fc80c0dfSnordmark connp->conn_flags = IPCL_RAWIPCONN; 2093bd670b35SErik Nordmark connp->conn_proto = IPPROTO_ICMP; 2094fc80c0dfSnordmark icmp->icmp_connp = connp; 2095bd670b35SErik Nordmark rw_init(&connp->conn_ilg_lock, NULL, RW_DEFAULT, NULL); 2096bd670b35SErik Nordmark connp->conn_ixa = kmem_zalloc(sizeof (ip_xmit_attr_t), kmflags); 2097bd670b35SErik Nordmark if (connp->conn_ixa == NULL) 2098bd670b35SErik Nordmark return (ENOMEM); 2099bd670b35SErik Nordmark connp->conn_ixa->ixa_refcnt = 1; 2100bd670b35SErik Nordmark connp->conn_ixa->ixa_protocol = connp->conn_proto; 2101bd670b35SErik Nordmark connp->conn_ixa->ixa_xmit_hint = CONN_TO_XMIT_HINT(connp); 2102fc80c0dfSnordmark return (0); 2103fc80c0dfSnordmark } 2104fc80c0dfSnordmark 2105fc80c0dfSnordmark /* ARGSUSED */ 2106fc80c0dfSnordmark static void 2107fc80c0dfSnordmark rawip_conn_destructor(void *buf, void *cdrarg) 2108fc80c0dfSnordmark { 2109fc80c0dfSnordmark itc_t *itc = (itc_t *)buf; 2110fc80c0dfSnordmark conn_t *connp = &itc->itc_conn; 2111fc80c0dfSnordmark icmp_t *icmp = (icmp_t *)&itc[1]; 2112fc80c0dfSnordmark 2113fc80c0dfSnordmark ASSERT(connp->conn_flags & IPCL_RAWIPCONN); 2114fc80c0dfSnordmark ASSERT(icmp->icmp_connp == connp); 2115fc80c0dfSnordmark ASSERT(connp->conn_icmp == icmp); 2116fc80c0dfSnordmark mutex_destroy(&connp->conn_lock); 2117fc80c0dfSnordmark cv_destroy(&connp->conn_cv); 2118bd670b35SErik Nordmark rw_destroy(&connp->conn_ilg_lock); 2119bd670b35SErik Nordmark 2120bd670b35SErik Nordmark /* Can be NULL if constructor failed */ 2121bd670b35SErik Nordmark if (connp->conn_ixa != NULL) { 2122bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_refcnt == 1); 2123bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_ire == NULL); 2124bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_nce == NULL); 2125bd670b35SErik Nordmark ixa_refrele(connp->conn_ixa); 2126bd670b35SErik Nordmark } 2127fc80c0dfSnordmark } 2128fc80c0dfSnordmark 2129fc80c0dfSnordmark /* ARGSUSED */ 2130fc80c0dfSnordmark static int 2131fc80c0dfSnordmark rts_conn_constructor(void *buf, void *cdrarg, int kmflags) 2132fc80c0dfSnordmark { 2133fc80c0dfSnordmark itc_t *itc = (itc_t *)buf; 2134fc80c0dfSnordmark conn_t *connp = &itc->itc_conn; 2135fc80c0dfSnordmark rts_t *rts = (rts_t *)&itc[1]; 2136fc80c0dfSnordmark 2137fc80c0dfSnordmark bzero(connp, sizeof (conn_t)); 2138fc80c0dfSnordmark bzero(rts, sizeof (rts_t)); 2139fc80c0dfSnordmark 2140fc80c0dfSnordmark mutex_init(&connp->conn_lock, NULL, MUTEX_DEFAULT, NULL); 2141fc80c0dfSnordmark cv_init(&connp->conn_cv, NULL, CV_DEFAULT, NULL); 2142fc80c0dfSnordmark connp->conn_rts = rts; 2143fc80c0dfSnordmark connp->conn_flags = IPCL_RTSCONN; 2144fc80c0dfSnordmark rts->rts_connp = connp; 2145bd670b35SErik Nordmark rw_init(&connp->conn_ilg_lock, NULL, RW_DEFAULT, NULL); 2146bd670b35SErik Nordmark connp->conn_ixa = kmem_zalloc(sizeof (ip_xmit_attr_t), kmflags); 2147bd670b35SErik Nordmark if (connp->conn_ixa == NULL) 2148bd670b35SErik Nordmark return (ENOMEM); 2149bd670b35SErik Nordmark connp->conn_ixa->ixa_refcnt = 1; 2150bd670b35SErik Nordmark connp->conn_ixa->ixa_xmit_hint = CONN_TO_XMIT_HINT(connp); 2151fc80c0dfSnordmark return (0); 2152fc80c0dfSnordmark } 2153fc80c0dfSnordmark 2154fc80c0dfSnordmark /* ARGSUSED */ 2155fc80c0dfSnordmark static void 2156fc80c0dfSnordmark rts_conn_destructor(void *buf, void *cdrarg) 2157fc80c0dfSnordmark { 2158fc80c0dfSnordmark itc_t *itc = (itc_t *)buf; 2159fc80c0dfSnordmark conn_t *connp = &itc->itc_conn; 2160fc80c0dfSnordmark rts_t *rts = (rts_t *)&itc[1]; 2161fc80c0dfSnordmark 2162fc80c0dfSnordmark ASSERT(connp->conn_flags & IPCL_RTSCONN); 2163fc80c0dfSnordmark ASSERT(rts->rts_connp == connp); 2164fc80c0dfSnordmark ASSERT(connp->conn_rts == rts); 2165fc80c0dfSnordmark mutex_destroy(&connp->conn_lock); 2166fc80c0dfSnordmark cv_destroy(&connp->conn_cv); 2167bd670b35SErik Nordmark rw_destroy(&connp->conn_ilg_lock); 2168fc80c0dfSnordmark 2169bd670b35SErik Nordmark /* Can be NULL if constructor failed */ 2170bd670b35SErik Nordmark if (connp->conn_ixa != NULL) { 2171bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_refcnt == 1); 2172bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_ire == NULL); 2173bd670b35SErik Nordmark ASSERT(connp->conn_ixa->ixa_nce == NULL); 2174bd670b35SErik Nordmark ixa_refrele(connp->conn_ixa); 21750f1702c5SYu Xiangning } 21760f1702c5SYu Xiangning } 217719a8a986SRao Shoaib 2178fc80c0dfSnordmark /* 2179fc80c0dfSnordmark * Called as part of ipcl_conn_destroy to assert and clear any pointers 2180fc80c0dfSnordmark * in the conn_t. 2181bd670b35SErik Nordmark * 2182bd670b35SErik Nordmark * Below we list all the pointers in the conn_t as a documentation aid. 2183bd670b35SErik Nordmark * The ones that we can not ASSERT to be NULL are #ifdef'ed out. 2184bd670b35SErik Nordmark * If you add any pointers to the conn_t please add an ASSERT here 2185bd670b35SErik Nordmark * and #ifdef it out if it can't be actually asserted to be NULL. 2186bd670b35SErik Nordmark * In any case, we bzero most of the conn_t at the end of the function. 2187fc80c0dfSnordmark */ 2188fc80c0dfSnordmark void 2189fc80c0dfSnordmark ipcl_conn_cleanup(conn_t *connp) 2190fc80c0dfSnordmark { 2191bd670b35SErik Nordmark ip_xmit_attr_t *ixa; 2192bd670b35SErik Nordmark 2193fc80c0dfSnordmark ASSERT(connp->conn_latch == NULL); 2194bd670b35SErik Nordmark ASSERT(connp->conn_latch_in_policy == NULL); 2195bd670b35SErik Nordmark ASSERT(connp->conn_latch_in_action == NULL); 2196fc80c0dfSnordmark #ifdef notdef 2197fc80c0dfSnordmark ASSERT(connp->conn_rq == NULL); 2198fc80c0dfSnordmark ASSERT(connp->conn_wq == NULL); 2199fc80c0dfSnordmark #endif 2200fc80c0dfSnordmark ASSERT(connp->conn_cred == NULL); 2201fc80c0dfSnordmark ASSERT(connp->conn_g_fanout == NULL); 2202fc80c0dfSnordmark ASSERT(connp->conn_g_next == NULL); 2203fc80c0dfSnordmark ASSERT(connp->conn_g_prev == NULL); 2204fc80c0dfSnordmark ASSERT(connp->conn_policy == NULL); 2205fc80c0dfSnordmark ASSERT(connp->conn_fanout == NULL); 2206fc80c0dfSnordmark ASSERT(connp->conn_next == NULL); 2207fc80c0dfSnordmark ASSERT(connp->conn_prev == NULL); 2208fc80c0dfSnordmark ASSERT(connp->conn_oper_pending_ill == NULL); 2209fc80c0dfSnordmark ASSERT(connp->conn_ilg == NULL); 2210fc80c0dfSnordmark ASSERT(connp->conn_drain_next == NULL); 2211fc80c0dfSnordmark ASSERT(connp->conn_drain_prev == NULL); 2212a9737be2Snordmark #ifdef notdef 2213a9737be2Snordmark /* conn_idl is not cleared when removed from idl list */ 2214fc80c0dfSnordmark ASSERT(connp->conn_idl == NULL); 2215a9737be2Snordmark #endif 2216fc80c0dfSnordmark ASSERT(connp->conn_ipsec_opt_mp == NULL); 2217bd670b35SErik Nordmark #ifdef notdef 2218bd670b35SErik Nordmark /* conn_netstack is cleared by the caller; needed by ixa_cleanup */ 2219fc80c0dfSnordmark ASSERT(connp->conn_netstack == NULL); 2220bd670b35SErik Nordmark #endif 2221fc80c0dfSnordmark 22220f1702c5SYu Xiangning ASSERT(connp->conn_helper_info == NULL); 2223bd670b35SErik Nordmark ASSERT(connp->conn_ixa != NULL); 2224bd670b35SErik Nordmark ixa = connp->conn_ixa; 2225bd670b35SErik Nordmark ASSERT(ixa->ixa_refcnt == 1); 2226bd670b35SErik Nordmark /* Need to preserve ixa_protocol */ 2227bd670b35SErik Nordmark ixa_cleanup(ixa); 2228bd670b35SErik Nordmark ixa->ixa_flags = 0; 2229bd670b35SErik Nordmark 2230fc80c0dfSnordmark /* Clear out the conn_t fields that are not preserved */ 2231fc80c0dfSnordmark bzero(&connp->conn_start_clr, 2232fc80c0dfSnordmark sizeof (conn_t) - 2233fc80c0dfSnordmark ((uchar_t *)&connp->conn_start_clr - (uchar_t *)connp)); 22347c478bd9Sstevel@tonic-gate } 22357c478bd9Sstevel@tonic-gate 22367c478bd9Sstevel@tonic-gate /* 22377c478bd9Sstevel@tonic-gate * All conns are inserted in a global multi-list for the benefit of 22387c478bd9Sstevel@tonic-gate * walkers. The walk is guaranteed to walk all open conns at the time 22397c478bd9Sstevel@tonic-gate * of the start of the walk exactly once. This property is needed to 22407c478bd9Sstevel@tonic-gate * achieve some cleanups during unplumb of interfaces. This is achieved 22417c478bd9Sstevel@tonic-gate * as follows. 22427c478bd9Sstevel@tonic-gate * 22437c478bd9Sstevel@tonic-gate * ipcl_conn_create and ipcl_conn_destroy are the only functions that 22447c478bd9Sstevel@tonic-gate * call the insert and delete functions below at creation and deletion 22457c478bd9Sstevel@tonic-gate * time respectively. The conn never moves or changes its position in this 22467c478bd9Sstevel@tonic-gate * multi-list during its lifetime. CONN_CONDEMNED ensures that the refcnt 22477c478bd9Sstevel@tonic-gate * won't increase due to walkers, once the conn deletion has started. Note 22487c478bd9Sstevel@tonic-gate * that we can't remove the conn from the global list and then wait for 22497c478bd9Sstevel@tonic-gate * the refcnt to drop to zero, since walkers would then see a truncated 22507c478bd9Sstevel@tonic-gate * list. CONN_INCIPIENT ensures that walkers don't start looking at 22517c478bd9Sstevel@tonic-gate * conns until ip_open is ready to make them globally visible. 22527c478bd9Sstevel@tonic-gate * The global round robin multi-list locks are held only to get the 22537c478bd9Sstevel@tonic-gate * next member/insertion/deletion and contention should be negligible 22547c478bd9Sstevel@tonic-gate * if the multi-list is much greater than the number of cpus. 22557c478bd9Sstevel@tonic-gate */ 22567c478bd9Sstevel@tonic-gate void 22577c478bd9Sstevel@tonic-gate ipcl_globalhash_insert(conn_t *connp) 22587c478bd9Sstevel@tonic-gate { 22597c478bd9Sstevel@tonic-gate int index; 2260f4b3ec61Sdh155122 struct connf_s *connfp; 2261f4b3ec61Sdh155122 ip_stack_t *ipst = connp->conn_netstack->netstack_ip; 22627c478bd9Sstevel@tonic-gate 22637c478bd9Sstevel@tonic-gate /* 22647c478bd9Sstevel@tonic-gate * No need for atomic here. Approximate even distribution 22657c478bd9Sstevel@tonic-gate * in the global lists is sufficient. 22667c478bd9Sstevel@tonic-gate */ 2267f4b3ec61Sdh155122 ipst->ips_conn_g_index++; 2268f4b3ec61Sdh155122 index = ipst->ips_conn_g_index & (CONN_G_HASH_SIZE - 1); 22697c478bd9Sstevel@tonic-gate 22707c478bd9Sstevel@tonic-gate connp->conn_g_prev = NULL; 22717c478bd9Sstevel@tonic-gate /* 22727c478bd9Sstevel@tonic-gate * Mark as INCIPIENT, so that walkers will ignore this 22737c478bd9Sstevel@tonic-gate * for now, till ip_open is ready to make it visible globally. 22747c478bd9Sstevel@tonic-gate */ 22757c478bd9Sstevel@tonic-gate connp->conn_state_flags |= CONN_INCIPIENT; 22767c478bd9Sstevel@tonic-gate 2277f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_globalhash_fanout[index]; 22787c478bd9Sstevel@tonic-gate /* Insert at the head of the list */ 2279f4b3ec61Sdh155122 mutex_enter(&connfp->connf_lock); 2280f4b3ec61Sdh155122 connp->conn_g_next = connfp->connf_head; 22817c478bd9Sstevel@tonic-gate if (connp->conn_g_next != NULL) 22827c478bd9Sstevel@tonic-gate connp->conn_g_next->conn_g_prev = connp; 2283f4b3ec61Sdh155122 connfp->connf_head = connp; 22847c478bd9Sstevel@tonic-gate 22857c478bd9Sstevel@tonic-gate /* The fanout bucket this conn points to */ 2286f4b3ec61Sdh155122 connp->conn_g_fanout = connfp; 22877c478bd9Sstevel@tonic-gate 2288f4b3ec61Sdh155122 mutex_exit(&connfp->connf_lock); 22897c478bd9Sstevel@tonic-gate } 22907c478bd9Sstevel@tonic-gate 22917c478bd9Sstevel@tonic-gate void 22927c478bd9Sstevel@tonic-gate ipcl_globalhash_remove(conn_t *connp) 22937c478bd9Sstevel@tonic-gate { 2294f4b3ec61Sdh155122 struct connf_s *connfp; 2295f4b3ec61Sdh155122 22967c478bd9Sstevel@tonic-gate /* 22977c478bd9Sstevel@tonic-gate * We were never inserted in the global multi list. 22987c478bd9Sstevel@tonic-gate * IPCL_NONE variety is never inserted in the global multilist 22997c478bd9Sstevel@tonic-gate * since it is presumed to not need any cleanup and is transient. 23007c478bd9Sstevel@tonic-gate */ 23017c478bd9Sstevel@tonic-gate if (connp->conn_g_fanout == NULL) 23027c478bd9Sstevel@tonic-gate return; 23037c478bd9Sstevel@tonic-gate 2304f4b3ec61Sdh155122 connfp = connp->conn_g_fanout; 2305f4b3ec61Sdh155122 mutex_enter(&connfp->connf_lock); 23067c478bd9Sstevel@tonic-gate if (connp->conn_g_prev != NULL) 23077c478bd9Sstevel@tonic-gate connp->conn_g_prev->conn_g_next = connp->conn_g_next; 23087c478bd9Sstevel@tonic-gate else 2309f4b3ec61Sdh155122 connfp->connf_head = connp->conn_g_next; 23107c478bd9Sstevel@tonic-gate if (connp->conn_g_next != NULL) 23117c478bd9Sstevel@tonic-gate connp->conn_g_next->conn_g_prev = connp->conn_g_prev; 2312f4b3ec61Sdh155122 mutex_exit(&connfp->connf_lock); 23137c478bd9Sstevel@tonic-gate 23147c478bd9Sstevel@tonic-gate /* Better to stumble on a null pointer than to corrupt memory */ 23157c478bd9Sstevel@tonic-gate connp->conn_g_next = NULL; 23167c478bd9Sstevel@tonic-gate connp->conn_g_prev = NULL; 2317fc80c0dfSnordmark connp->conn_g_fanout = NULL; 23187c478bd9Sstevel@tonic-gate } 23197c478bd9Sstevel@tonic-gate 23207c478bd9Sstevel@tonic-gate /* 23217c478bd9Sstevel@tonic-gate * Walk the list of all conn_t's in the system, calling the function provided 2322bd670b35SErik Nordmark * With the specified argument for each. 23237c478bd9Sstevel@tonic-gate * Applies to both IPv4 and IPv6. 23247c478bd9Sstevel@tonic-gate * 2325bd670b35SErik Nordmark * CONNs may hold pointers to ills (conn_dhcpinit_ill and 2326bd670b35SErik Nordmark * conn_oper_pending_ill). To guard against stale pointers 23277c478bd9Sstevel@tonic-gate * ipcl_walk() is called to cleanup the conn_t's, typically when an interface is 23287c478bd9Sstevel@tonic-gate * unplumbed or removed. New conn_t's that are created while we are walking 23297c478bd9Sstevel@tonic-gate * may be missed by this walk, because they are not necessarily inserted 23307c478bd9Sstevel@tonic-gate * at the tail of the list. They are new conn_t's and thus don't have any 23317c478bd9Sstevel@tonic-gate * stale pointers. The CONN_CLOSING flag ensures that no new reference 23327c478bd9Sstevel@tonic-gate * is created to the struct that is going away. 23337c478bd9Sstevel@tonic-gate */ 23347c478bd9Sstevel@tonic-gate void 2335f4b3ec61Sdh155122 ipcl_walk(pfv_t func, void *arg, ip_stack_t *ipst) 23367c478bd9Sstevel@tonic-gate { 23377c478bd9Sstevel@tonic-gate int i; 23387c478bd9Sstevel@tonic-gate conn_t *connp; 23397c478bd9Sstevel@tonic-gate conn_t *prev_connp; 23407c478bd9Sstevel@tonic-gate 23417c478bd9Sstevel@tonic-gate for (i = 0; i < CONN_G_HASH_SIZE; i++) { 2342f4b3ec61Sdh155122 mutex_enter(&ipst->ips_ipcl_globalhash_fanout[i].connf_lock); 23437c478bd9Sstevel@tonic-gate prev_connp = NULL; 2344f4b3ec61Sdh155122 connp = ipst->ips_ipcl_globalhash_fanout[i].connf_head; 23457c478bd9Sstevel@tonic-gate while (connp != NULL) { 23467c478bd9Sstevel@tonic-gate mutex_enter(&connp->conn_lock); 23477c478bd9Sstevel@tonic-gate if (connp->conn_state_flags & 23487c478bd9Sstevel@tonic-gate (CONN_CONDEMNED | CONN_INCIPIENT)) { 23497c478bd9Sstevel@tonic-gate mutex_exit(&connp->conn_lock); 23507c478bd9Sstevel@tonic-gate connp = connp->conn_g_next; 23517c478bd9Sstevel@tonic-gate continue; 23527c478bd9Sstevel@tonic-gate } 23537c478bd9Sstevel@tonic-gate CONN_INC_REF_LOCKED(connp); 23547c478bd9Sstevel@tonic-gate mutex_exit(&connp->conn_lock); 2355f4b3ec61Sdh155122 mutex_exit( 2356f4b3ec61Sdh155122 &ipst->ips_ipcl_globalhash_fanout[i].connf_lock); 23577c478bd9Sstevel@tonic-gate (*func)(connp, arg); 23587c478bd9Sstevel@tonic-gate if (prev_connp != NULL) 23597c478bd9Sstevel@tonic-gate CONN_DEC_REF(prev_connp); 2360f4b3ec61Sdh155122 mutex_enter( 2361f4b3ec61Sdh155122 &ipst->ips_ipcl_globalhash_fanout[i].connf_lock); 23627c478bd9Sstevel@tonic-gate prev_connp = connp; 23637c478bd9Sstevel@tonic-gate connp = connp->conn_g_next; 23647c478bd9Sstevel@tonic-gate } 2365f4b3ec61Sdh155122 mutex_exit(&ipst->ips_ipcl_globalhash_fanout[i].connf_lock); 23667c478bd9Sstevel@tonic-gate if (prev_connp != NULL) 23677c478bd9Sstevel@tonic-gate CONN_DEC_REF(prev_connp); 23687c478bd9Sstevel@tonic-gate } 23697c478bd9Sstevel@tonic-gate } 23707c478bd9Sstevel@tonic-gate 23717c478bd9Sstevel@tonic-gate /* 23727c478bd9Sstevel@tonic-gate * Search for a peer TCP/IPv4 loopback conn by doing a reverse lookup on 23737c478bd9Sstevel@tonic-gate * the {src, dst, lport, fport} quadruplet. Returns with conn reference 23747c478bd9Sstevel@tonic-gate * held; caller must call CONN_DEC_REF. Only checks for connected entries 2375d0ab37afSethindra * (peer tcp in ESTABLISHED state). 23767c478bd9Sstevel@tonic-gate */ 23777c478bd9Sstevel@tonic-gate conn_t * 2378bd670b35SErik Nordmark ipcl_conn_tcp_lookup_reversed_ipv4(conn_t *connp, ipha_t *ipha, tcpha_t *tcpha, 2379f4b3ec61Sdh155122 ip_stack_t *ipst) 23807c478bd9Sstevel@tonic-gate { 23817c478bd9Sstevel@tonic-gate uint32_t ports; 23827c478bd9Sstevel@tonic-gate uint16_t *pports = (uint16_t *)&ports; 23837c478bd9Sstevel@tonic-gate connf_t *connfp; 23847c478bd9Sstevel@tonic-gate conn_t *tconnp; 23857c478bd9Sstevel@tonic-gate boolean_t zone_chk; 23867c478bd9Sstevel@tonic-gate 23877c478bd9Sstevel@tonic-gate /* 23887c478bd9Sstevel@tonic-gate * If either the source of destination address is loopback, then 23897c478bd9Sstevel@tonic-gate * both endpoints must be in the same Zone. Otherwise, both of 23907c478bd9Sstevel@tonic-gate * the addresses are system-wide unique (tcp is in ESTABLISHED 23917c478bd9Sstevel@tonic-gate * state) and the endpoints may reside in different Zones. 23927c478bd9Sstevel@tonic-gate */ 23937c478bd9Sstevel@tonic-gate zone_chk = (ipha->ipha_src == htonl(INADDR_LOOPBACK) || 23947c478bd9Sstevel@tonic-gate ipha->ipha_dst == htonl(INADDR_LOOPBACK)); 23957c478bd9Sstevel@tonic-gate 2396bd670b35SErik Nordmark pports[0] = tcpha->tha_fport; 2397bd670b35SErik Nordmark pports[1] = tcpha->tha_lport; 23987c478bd9Sstevel@tonic-gate 2399f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_conn_fanout[IPCL_CONN_HASH(ipha->ipha_dst, 2400f4b3ec61Sdh155122 ports, ipst)]; 24017c478bd9Sstevel@tonic-gate 24027c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 24037c478bd9Sstevel@tonic-gate for (tconnp = connfp->connf_head; tconnp != NULL; 24047c478bd9Sstevel@tonic-gate tconnp = tconnp->conn_next) { 24057c478bd9Sstevel@tonic-gate 24067c478bd9Sstevel@tonic-gate if (IPCL_CONN_MATCH(tconnp, IPPROTO_TCP, 24077c478bd9Sstevel@tonic-gate ipha->ipha_dst, ipha->ipha_src, ports) && 2408d0ab37afSethindra tconnp->conn_tcp->tcp_state == TCPS_ESTABLISHED && 24097c478bd9Sstevel@tonic-gate (!zone_chk || tconnp->conn_zoneid == connp->conn_zoneid)) { 24107c478bd9Sstevel@tonic-gate 24117c478bd9Sstevel@tonic-gate ASSERT(tconnp != connp); 24127c478bd9Sstevel@tonic-gate CONN_INC_REF(tconnp); 24137c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 24147c478bd9Sstevel@tonic-gate return (tconnp); 24157c478bd9Sstevel@tonic-gate } 24167c478bd9Sstevel@tonic-gate } 24177c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 24187c478bd9Sstevel@tonic-gate return (NULL); 24197c478bd9Sstevel@tonic-gate } 24207c478bd9Sstevel@tonic-gate 24217c478bd9Sstevel@tonic-gate /* 24227c478bd9Sstevel@tonic-gate * Search for a peer TCP/IPv6 loopback conn by doing a reverse lookup on 24237c478bd9Sstevel@tonic-gate * the {src, dst, lport, fport} quadruplet. Returns with conn reference 24247c478bd9Sstevel@tonic-gate * held; caller must call CONN_DEC_REF. Only checks for connected entries 2425d0ab37afSethindra * (peer tcp in ESTABLISHED state). 24267c478bd9Sstevel@tonic-gate */ 24277c478bd9Sstevel@tonic-gate conn_t * 2428bd670b35SErik Nordmark ipcl_conn_tcp_lookup_reversed_ipv6(conn_t *connp, ip6_t *ip6h, tcpha_t *tcpha, 2429f4b3ec61Sdh155122 ip_stack_t *ipst) 24307c478bd9Sstevel@tonic-gate { 24317c478bd9Sstevel@tonic-gate uint32_t ports; 24327c478bd9Sstevel@tonic-gate uint16_t *pports = (uint16_t *)&ports; 24337c478bd9Sstevel@tonic-gate connf_t *connfp; 24347c478bd9Sstevel@tonic-gate conn_t *tconnp; 24357c478bd9Sstevel@tonic-gate boolean_t zone_chk; 24367c478bd9Sstevel@tonic-gate 24377c478bd9Sstevel@tonic-gate /* 24387c478bd9Sstevel@tonic-gate * If either the source of destination address is loopback, then 24397c478bd9Sstevel@tonic-gate * both endpoints must be in the same Zone. Otherwise, both of 24407c478bd9Sstevel@tonic-gate * the addresses are system-wide unique (tcp is in ESTABLISHED 24417c478bd9Sstevel@tonic-gate * state) and the endpoints may reside in different Zones. We 24427c478bd9Sstevel@tonic-gate * don't do Zone check for link local address(es) because the 24437c478bd9Sstevel@tonic-gate * current Zone implementation treats each link local address as 24447c478bd9Sstevel@tonic-gate * being unique per system node, i.e. they belong to global Zone. 24457c478bd9Sstevel@tonic-gate */ 24467c478bd9Sstevel@tonic-gate zone_chk = (IN6_IS_ADDR_LOOPBACK(&ip6h->ip6_src) || 24477c478bd9Sstevel@tonic-gate IN6_IS_ADDR_LOOPBACK(&ip6h->ip6_dst)); 24487c478bd9Sstevel@tonic-gate 2449bd670b35SErik Nordmark pports[0] = tcpha->tha_fport; 2450bd670b35SErik Nordmark pports[1] = tcpha->tha_lport; 24517c478bd9Sstevel@tonic-gate 2452f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_conn_fanout[IPCL_CONN_HASH_V6(ip6h->ip6_dst, 2453f4b3ec61Sdh155122 ports, ipst)]; 24547c478bd9Sstevel@tonic-gate 24557c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 24567c478bd9Sstevel@tonic-gate for (tconnp = connfp->connf_head; tconnp != NULL; 24577c478bd9Sstevel@tonic-gate tconnp = tconnp->conn_next) { 24587c478bd9Sstevel@tonic-gate 2459bd670b35SErik Nordmark /* We skip conn_bound_if check here as this is loopback tcp */ 24607c478bd9Sstevel@tonic-gate if (IPCL_CONN_MATCH_V6(tconnp, IPPROTO_TCP, 24617c478bd9Sstevel@tonic-gate ip6h->ip6_dst, ip6h->ip6_src, ports) && 2462d0ab37afSethindra tconnp->conn_tcp->tcp_state == TCPS_ESTABLISHED && 24637c478bd9Sstevel@tonic-gate (!zone_chk || tconnp->conn_zoneid == connp->conn_zoneid)) { 24647c478bd9Sstevel@tonic-gate 24657c478bd9Sstevel@tonic-gate ASSERT(tconnp != connp); 24667c478bd9Sstevel@tonic-gate CONN_INC_REF(tconnp); 24677c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 24687c478bd9Sstevel@tonic-gate return (tconnp); 24697c478bd9Sstevel@tonic-gate } 24707c478bd9Sstevel@tonic-gate } 24717c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 24727c478bd9Sstevel@tonic-gate return (NULL); 24737c478bd9Sstevel@tonic-gate } 24747c478bd9Sstevel@tonic-gate 24757c478bd9Sstevel@tonic-gate /* 24767c478bd9Sstevel@tonic-gate * Find an exact {src, dst, lport, fport} match for a bounced datagram. 24777c478bd9Sstevel@tonic-gate * Returns with conn reference held. Caller must call CONN_DEC_REF. 24787c478bd9Sstevel@tonic-gate * Only checks for connected entries i.e. no INADDR_ANY checks. 24797c478bd9Sstevel@tonic-gate */ 24807c478bd9Sstevel@tonic-gate conn_t * 2481bd670b35SErik Nordmark ipcl_tcp_lookup_reversed_ipv4(ipha_t *ipha, tcpha_t *tcpha, int min_state, 2482f4b3ec61Sdh155122 ip_stack_t *ipst) 24837c478bd9Sstevel@tonic-gate { 24847c478bd9Sstevel@tonic-gate uint32_t ports; 24857c478bd9Sstevel@tonic-gate uint16_t *pports; 24867c478bd9Sstevel@tonic-gate connf_t *connfp; 24877c478bd9Sstevel@tonic-gate conn_t *tconnp; 24887c478bd9Sstevel@tonic-gate 24897c478bd9Sstevel@tonic-gate pports = (uint16_t *)&ports; 2490bd670b35SErik Nordmark pports[0] = tcpha->tha_fport; 2491bd670b35SErik Nordmark pports[1] = tcpha->tha_lport; 24927c478bd9Sstevel@tonic-gate 2493f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_conn_fanout[IPCL_CONN_HASH(ipha->ipha_dst, 2494f4b3ec61Sdh155122 ports, ipst)]; 24957c478bd9Sstevel@tonic-gate 24967c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 24977c478bd9Sstevel@tonic-gate for (tconnp = connfp->connf_head; tconnp != NULL; 24987c478bd9Sstevel@tonic-gate tconnp = tconnp->conn_next) { 24997c478bd9Sstevel@tonic-gate 25007c478bd9Sstevel@tonic-gate if (IPCL_CONN_MATCH(tconnp, IPPROTO_TCP, 25017c478bd9Sstevel@tonic-gate ipha->ipha_dst, ipha->ipha_src, ports) && 25027c478bd9Sstevel@tonic-gate tconnp->conn_tcp->tcp_state >= min_state) { 25037c478bd9Sstevel@tonic-gate 25047c478bd9Sstevel@tonic-gate CONN_INC_REF(tconnp); 25057c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 25067c478bd9Sstevel@tonic-gate return (tconnp); 25077c478bd9Sstevel@tonic-gate } 25087c478bd9Sstevel@tonic-gate } 25097c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 25107c478bd9Sstevel@tonic-gate return (NULL); 25117c478bd9Sstevel@tonic-gate } 25127c478bd9Sstevel@tonic-gate 25137c478bd9Sstevel@tonic-gate /* 25147c478bd9Sstevel@tonic-gate * Find an exact {src, dst, lport, fport} match for a bounced datagram. 25157c478bd9Sstevel@tonic-gate * Returns with conn reference held. Caller must call CONN_DEC_REF. 25167c478bd9Sstevel@tonic-gate * Only checks for connected entries i.e. no INADDR_ANY checks. 25177c478bd9Sstevel@tonic-gate * Match on ifindex in addition to addresses. 25187c478bd9Sstevel@tonic-gate */ 25197c478bd9Sstevel@tonic-gate conn_t * 25207c478bd9Sstevel@tonic-gate ipcl_tcp_lookup_reversed_ipv6(ip6_t *ip6h, tcpha_t *tcpha, int min_state, 2521f4b3ec61Sdh155122 uint_t ifindex, ip_stack_t *ipst) 25227c478bd9Sstevel@tonic-gate { 25237c478bd9Sstevel@tonic-gate tcp_t *tcp; 25247c478bd9Sstevel@tonic-gate uint32_t ports; 25257c478bd9Sstevel@tonic-gate uint16_t *pports; 25267c478bd9Sstevel@tonic-gate connf_t *connfp; 25277c478bd9Sstevel@tonic-gate conn_t *tconnp; 25287c478bd9Sstevel@tonic-gate 25297c478bd9Sstevel@tonic-gate pports = (uint16_t *)&ports; 25307c478bd9Sstevel@tonic-gate pports[0] = tcpha->tha_fport; 25317c478bd9Sstevel@tonic-gate pports[1] = tcpha->tha_lport; 25327c478bd9Sstevel@tonic-gate 2533f4b3ec61Sdh155122 connfp = &ipst->ips_ipcl_conn_fanout[IPCL_CONN_HASH_V6(ip6h->ip6_dst, 2534f4b3ec61Sdh155122 ports, ipst)]; 25357c478bd9Sstevel@tonic-gate 25367c478bd9Sstevel@tonic-gate mutex_enter(&connfp->connf_lock); 25377c478bd9Sstevel@tonic-gate for (tconnp = connfp->connf_head; tconnp != NULL; 25387c478bd9Sstevel@tonic-gate tconnp = tconnp->conn_next) { 25397c478bd9Sstevel@tonic-gate 25407c478bd9Sstevel@tonic-gate tcp = tconnp->conn_tcp; 25417c478bd9Sstevel@tonic-gate if (IPCL_CONN_MATCH_V6(tconnp, IPPROTO_TCP, 25427c478bd9Sstevel@tonic-gate ip6h->ip6_dst, ip6h->ip6_src, ports) && 25437c478bd9Sstevel@tonic-gate tcp->tcp_state >= min_state && 2544bd670b35SErik Nordmark (tconnp->conn_bound_if == 0 || 2545bd670b35SErik Nordmark tconnp->conn_bound_if == ifindex)) { 25467c478bd9Sstevel@tonic-gate 25477c478bd9Sstevel@tonic-gate CONN_INC_REF(tconnp); 25487c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 25497c478bd9Sstevel@tonic-gate return (tconnp); 25507c478bd9Sstevel@tonic-gate } 25517c478bd9Sstevel@tonic-gate } 25527c478bd9Sstevel@tonic-gate mutex_exit(&connfp->connf_lock); 25537c478bd9Sstevel@tonic-gate return (NULL); 25547c478bd9Sstevel@tonic-gate } 25557c478bd9Sstevel@tonic-gate 25567c478bd9Sstevel@tonic-gate /* 255745916cd2Sjpk * Finds a TCP/IPv4 listening connection; called by tcp_disconnect to locate 255845916cd2Sjpk * a listener when changing state. 25597c478bd9Sstevel@tonic-gate */ 25607c478bd9Sstevel@tonic-gate conn_t * 2561f4b3ec61Sdh155122 ipcl_lookup_listener_v4(uint16_t lport, ipaddr_t laddr, zoneid_t zoneid, 2562f4b3ec61Sdh155122 ip_stack_t *ipst) 25637c478bd9Sstevel@tonic-gate { 25647c478bd9Sstevel@tonic-gate connf_t *bind_connfp; 25657c478bd9Sstevel@tonic-gate conn_t *connp; 25667c478bd9Sstevel@tonic-gate tcp_t *tcp; 25677c478bd9Sstevel@tonic-gate 25687c478bd9Sstevel@tonic-gate /* 25697c478bd9Sstevel@tonic-gate * Avoid false matches for packets sent to an IP destination of 25707c478bd9Sstevel@tonic-gate * all zeros. 25717c478bd9Sstevel@tonic-gate */ 25727c478bd9Sstevel@tonic-gate if (laddr == 0) 25737c478bd9Sstevel@tonic-gate return (NULL); 25747c478bd9Sstevel@tonic-gate 257545916cd2Sjpk ASSERT(zoneid != ALL_ZONES); 257645916cd2Sjpk 2577f4b3ec61Sdh155122 bind_connfp = &ipst->ips_ipcl_bind_fanout[IPCL_BIND_HASH(lport, ipst)]; 25787c478bd9Sstevel@tonic-gate mutex_enter(&bind_connfp->connf_lock); 25797c478bd9Sstevel@tonic-gate for (connp = bind_connfp->connf_head; connp != NULL; 25807c478bd9Sstevel@tonic-gate connp = connp->conn_next) { 25817c478bd9Sstevel@tonic-gate tcp = connp->conn_tcp; 25827c478bd9Sstevel@tonic-gate if (IPCL_BIND_MATCH(connp, IPPROTO_TCP, laddr, lport) && 25835d0bc3edSsommerfe IPCL_ZONE_MATCH(connp, zoneid) && 25847c478bd9Sstevel@tonic-gate (tcp->tcp_listener == NULL)) { 25857c478bd9Sstevel@tonic-gate CONN_INC_REF(connp); 25867c478bd9Sstevel@tonic-gate mutex_exit(&bind_connfp->connf_lock); 25877c478bd9Sstevel@tonic-gate return (connp); 25887c478bd9Sstevel@tonic-gate } 25897c478bd9Sstevel@tonic-gate } 25907c478bd9Sstevel@tonic-gate mutex_exit(&bind_connfp->connf_lock); 25917c478bd9Sstevel@tonic-gate return (NULL); 25927c478bd9Sstevel@tonic-gate } 25937c478bd9Sstevel@tonic-gate 259445916cd2Sjpk /* 259545916cd2Sjpk * Finds a TCP/IPv6 listening connection; called by tcp_disconnect to locate 259645916cd2Sjpk * a listener when changing state. 259745916cd2Sjpk */ 25987c478bd9Sstevel@tonic-gate conn_t * 25997c478bd9Sstevel@tonic-gate ipcl_lookup_listener_v6(uint16_t lport, in6_addr_t *laddr, uint_t ifindex, 2600f4b3ec61Sdh155122 zoneid_t zoneid, ip_stack_t *ipst) 26017c478bd9Sstevel@tonic-gate { 26027c478bd9Sstevel@tonic-gate connf_t *bind_connfp; 26037c478bd9Sstevel@tonic-gate conn_t *connp = NULL; 26047c478bd9Sstevel@tonic-gate tcp_t *tcp; 26057c478bd9Sstevel@tonic-gate 26067c478bd9Sstevel@tonic-gate /* 26077c478bd9Sstevel@tonic-gate * Avoid false matches for packets sent to an IP destination of 26087c478bd9Sstevel@tonic-gate * all zeros. 26097c478bd9Sstevel@tonic-gate */ 26107c478bd9Sstevel@tonic-gate if (IN6_IS_ADDR_UNSPECIFIED(laddr)) 26117c478bd9Sstevel@tonic-gate return (NULL); 26127c478bd9Sstevel@tonic-gate 261345916cd2Sjpk ASSERT(zoneid != ALL_ZONES); 26147c478bd9Sstevel@tonic-gate 2615f4b3ec61Sdh155122 bind_connfp = &ipst->ips_ipcl_bind_fanout[IPCL_BIND_HASH(lport, ipst)]; 26167c478bd9Sstevel@tonic-gate mutex_enter(&bind_connfp->connf_lock); 26177c478bd9Sstevel@tonic-gate for (connp = bind_connfp->connf_head; connp != NULL; 26187c478bd9Sstevel@tonic-gate connp = connp->conn_next) { 26197c478bd9Sstevel@tonic-gate tcp = connp->conn_tcp; 26207c478bd9Sstevel@tonic-gate if (IPCL_BIND_MATCH_V6(connp, IPPROTO_TCP, *laddr, lport) && 26215d0bc3edSsommerfe IPCL_ZONE_MATCH(connp, zoneid) && 2622bd670b35SErik Nordmark (connp->conn_bound_if == 0 || 2623bd670b35SErik Nordmark connp->conn_bound_if == ifindex) && 26247c478bd9Sstevel@tonic-gate tcp->tcp_listener == NULL) { 26257c478bd9Sstevel@tonic-gate CONN_INC_REF(connp); 26267c478bd9Sstevel@tonic-gate mutex_exit(&bind_connfp->connf_lock); 26277c478bd9Sstevel@tonic-gate return (connp); 26287c478bd9Sstevel@tonic-gate } 26297c478bd9Sstevel@tonic-gate } 26307c478bd9Sstevel@tonic-gate mutex_exit(&bind_connfp->connf_lock); 26317c478bd9Sstevel@tonic-gate return (NULL); 26327c478bd9Sstevel@tonic-gate } 26337c478bd9Sstevel@tonic-gate 2634ff550d0eSmasputra /* 2635ff550d0eSmasputra * ipcl_get_next_conn 2636ff550d0eSmasputra * get the next entry in the conn global list 2637ff550d0eSmasputra * and put a reference on the next_conn. 2638ff550d0eSmasputra * decrement the reference on the current conn. 2639ff550d0eSmasputra * 2640ff550d0eSmasputra * This is an iterator based walker function that also provides for 2641ff550d0eSmasputra * some selection by the caller. It walks through the conn_hash bucket 2642ff550d0eSmasputra * searching for the next valid connp in the list, and selects connections 2643ff550d0eSmasputra * that are neither closed nor condemned. It also REFHOLDS the conn 2644ff550d0eSmasputra * thus ensuring that the conn exists when the caller uses the conn. 2645ff550d0eSmasputra */ 2646ff550d0eSmasputra conn_t * 2647ff550d0eSmasputra ipcl_get_next_conn(connf_t *connfp, conn_t *connp, uint32_t conn_flags) 2648ff550d0eSmasputra { 2649ff550d0eSmasputra conn_t *next_connp; 2650ff550d0eSmasputra 2651ff550d0eSmasputra if (connfp == NULL) 2652ff550d0eSmasputra return (NULL); 2653ff550d0eSmasputra 2654ff550d0eSmasputra mutex_enter(&connfp->connf_lock); 2655ff550d0eSmasputra 2656ff550d0eSmasputra next_connp = (connp == NULL) ? 2657ff550d0eSmasputra connfp->connf_head : connp->conn_g_next; 2658ff550d0eSmasputra 2659ff550d0eSmasputra while (next_connp != NULL) { 2660ff550d0eSmasputra mutex_enter(&next_connp->conn_lock); 2661ff550d0eSmasputra if (!(next_connp->conn_flags & conn_flags) || 2662ff550d0eSmasputra (next_connp->conn_state_flags & 2663ff550d0eSmasputra (CONN_CONDEMNED | CONN_INCIPIENT))) { 2664ff550d0eSmasputra /* 2665ff550d0eSmasputra * This conn has been condemned or 2666ff550d0eSmasputra * is closing, or the flags don't match 2667ff550d0eSmasputra */ 2668ff550d0eSmasputra mutex_exit(&next_connp->conn_lock); 2669ff550d0eSmasputra next_connp = next_connp->conn_g_next; 2670ff550d0eSmasputra continue; 2671ff550d0eSmasputra } 2672ff550d0eSmasputra CONN_INC_REF_LOCKED(next_connp); 2673ff550d0eSmasputra mutex_exit(&next_connp->conn_lock); 2674ff550d0eSmasputra break; 2675ff550d0eSmasputra } 2676ff550d0eSmasputra 2677ff550d0eSmasputra mutex_exit(&connfp->connf_lock); 2678ff550d0eSmasputra 2679ff550d0eSmasputra if (connp != NULL) 2680ff550d0eSmasputra CONN_DEC_REF(connp); 2681ff550d0eSmasputra 2682ff550d0eSmasputra return (next_connp); 2683ff550d0eSmasputra } 2684ff550d0eSmasputra 26857c478bd9Sstevel@tonic-gate #ifdef CONN_DEBUG 26867c478bd9Sstevel@tonic-gate /* 26877c478bd9Sstevel@tonic-gate * Trace of the last NBUF refhold/refrele 26887c478bd9Sstevel@tonic-gate */ 26897c478bd9Sstevel@tonic-gate int 26907c478bd9Sstevel@tonic-gate conn_trace_ref(conn_t *connp) 26917c478bd9Sstevel@tonic-gate { 26927c478bd9Sstevel@tonic-gate int last; 26937c478bd9Sstevel@tonic-gate conn_trace_t *ctb; 26947c478bd9Sstevel@tonic-gate 26957c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&connp->conn_lock)); 26967c478bd9Sstevel@tonic-gate last = connp->conn_trace_last; 26977c478bd9Sstevel@tonic-gate last++; 26987c478bd9Sstevel@tonic-gate if (last == CONN_TRACE_MAX) 26997c478bd9Sstevel@tonic-gate last = 0; 27007c478bd9Sstevel@tonic-gate 27017c478bd9Sstevel@tonic-gate ctb = &connp->conn_trace_buf[last]; 27026a8288c7Scarlsonj ctb->ctb_depth = getpcstack(ctb->ctb_stack, CONN_STACK_DEPTH); 27037c478bd9Sstevel@tonic-gate connp->conn_trace_last = last; 27047c478bd9Sstevel@tonic-gate return (1); 27057c478bd9Sstevel@tonic-gate } 27067c478bd9Sstevel@tonic-gate 27077c478bd9Sstevel@tonic-gate int 27087c478bd9Sstevel@tonic-gate conn_untrace_ref(conn_t *connp) 27097c478bd9Sstevel@tonic-gate { 27107c478bd9Sstevel@tonic-gate int last; 27117c478bd9Sstevel@tonic-gate conn_trace_t *ctb; 27127c478bd9Sstevel@tonic-gate 27137c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&connp->conn_lock)); 27147c478bd9Sstevel@tonic-gate last = connp->conn_trace_last; 27157c478bd9Sstevel@tonic-gate last++; 27167c478bd9Sstevel@tonic-gate if (last == CONN_TRACE_MAX) 27177c478bd9Sstevel@tonic-gate last = 0; 27187c478bd9Sstevel@tonic-gate 27197c478bd9Sstevel@tonic-gate ctb = &connp->conn_trace_buf[last]; 27206a8288c7Scarlsonj ctb->ctb_depth = getpcstack(ctb->ctb_stack, CONN_STACK_DEPTH); 27217c478bd9Sstevel@tonic-gate connp->conn_trace_last = last; 27227c478bd9Sstevel@tonic-gate return (1); 27237c478bd9Sstevel@tonic-gate } 27247c478bd9Sstevel@tonic-gate #endif 2725