1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #ifndef _INET_IPCLASSIFIER_H 27 #define _INET_IPCLASSIFIER_H 28 29 #pragma ident "%Z%%M% %I% %E% SMI" 30 31 #ifdef __cplusplus 32 extern "C" { 33 #endif 34 35 #include <inet/common.h> 36 #include <inet/ip.h> 37 #include <inet/mi.h> 38 #include <inet/tcp.h> 39 #include <inet/ip6.h> 40 #include <netinet/in.h> /* for IPPROTO_* constants */ 41 #include <sys/sdt.h> 42 43 typedef void (*edesc_spf)(void *, mblk_t *, void *, int); 44 typedef void (*edesc_rpf)(void *, mblk_t *, void *); 45 46 /* 47 * ============================== 48 * = The CONNECTION = 49 * ============================== 50 */ 51 52 /* 53 * The connection structure contains the common information/flags/ref needed. 54 * Implementation will keep the connection struct, the layers (with their 55 * respective data for event i.e. tcp_t if event was tcp_input) all in one 56 * contiguous memory location. 57 */ 58 59 /* Conn Flags */ 60 #define IPCL_UDPMOD 0x00020000 /* Is UDP module instance */ 61 #define IPCL_TCPMOD 0x00040000 /* Is TCP module instance */ 62 #define IPCL_FULLY_BOUND 0x00080000 /* Bound to correct squeue */ 63 #define IPCL_CHECK_POLICY 0x00100000 /* Needs policy checking */ 64 #define IPCL_SOCKET 0x00200000 /* Sockfs connection */ 65 #define IPCL_ACCEPTOR 0x00400000 /* Sockfs priv acceptor */ 66 #define IPCL_CL_LISTENER 0x00800000 /* Cluster listener */ 67 #define IPCL_EAGER 0x01000000 /* Incoming connection */ 68 #define IPCL_UDP 0x02000000 /* A UDP connection */ 69 #define IPCL_TCP6 0x04000000 /* A TCP6 connection */ 70 #define IPCL_TCP4 0x08000000 /* A TCP connection */ 71 #define IPCL_CONNECTED 0x40000000 /* Conn in connected table */ 72 #define IPCL_BOUND 0x80000000 /* Conn in bind table */ 73 74 /* Flags identifying the type of conn */ 75 #define IPCL_TCPCONN 0x00000001 /* Flag to indicate cache */ 76 #define IPCL_SCTPCONN 0x00000002 77 #define IPCL_IPCCONN 0x00000004 78 #define IPCL_ISV6 0x00000008 /* Is a V6 connection */ 79 #define IPCL_IPTUN 0x00000010 /* Has "tun" plumbed above it */ 80 81 /* Conn Masks */ 82 #define IPCL_TCP (IPCL_TCP4|IPCL_TCP6) 83 #define IPCL_REMOVED 0x00000020 84 #define IPCL_REUSED 0x00000040 85 86 #define IPCL_IS_TCP4(connp) \ 87 (((connp)->conn_flags & IPCL_TCP4)) 88 89 #define IPCL_IS_TCP4_CONNECTED_NO_POLICY(connp) \ 90 (((connp)->conn_flags & \ 91 (IPCL_TCP4|IPCL_CONNECTED|IPCL_CHECK_POLICY|IPCL_TCP6)) \ 92 == (IPCL_TCP4|IPCL_CONNECTED)) 93 94 #define IPCL_IS_CONNECTED(connp) \ 95 ((connp)->conn_flags & IPCL_CONNECTED) 96 97 #define IPCL_IS_BOUND(connp) \ 98 ((connp)->conn_flags & IPCL_BOUND) 99 100 #define IPCL_IS_TCP4_BOUND(connp) \ 101 (((connp)->conn_flags & \ 102 (IPCL_TCP4|IPCL_BOUND|IPCL_TCP6)) == \ 103 (IPCL_TCP4|IPCL_BOUND)) 104 105 #define IPCL_IS_FULLY_BOUND(connp) \ 106 ((connp)->conn_flags & IPCL_FULLY_BOUND) 107 108 #define IPCL_IS_TCP(connp) \ 109 ((connp)->conn_flags & (IPCL_TCP4|IPCL_TCP6)) 110 111 /* 112 * IPCL_UDP is set on the conn when udp is directly above ip; 113 * this flag is cleared the moment udp is popped. 114 */ 115 #define IPCL_IS_UDP(connp) \ 116 ((connp)->conn_flags & IPCL_UDP) 117 118 #define IPCL_IS_IPTUN(connp) \ 119 (((connp)->conn_ulp == IPPROTO_ENCAP || \ 120 (connp)->conn_ulp == IPPROTO_IPV6) && \ 121 ((connp)->conn_flags & IPCL_IPTUN)) 122 123 typedef struct connf_s connf_t; 124 typedef struct 125 { 126 int ctb_depth; 127 #define IP_STACK_DEPTH 15 128 pc_t ctb_stack[IP_STACK_DEPTH]; 129 } conn_trace_t; 130 131 struct conn_s { 132 kmutex_t conn_lock; 133 uint32_t conn_ref; /* Reference counter */ 134 uint_t conn_state_flags; /* IP state flags */ 135 ire_t *conn_ire_cache; /* outbound ire cache */ 136 uint32_t conn_flags; /* Conn Flags */ 137 unsigned int 138 conn_on_sqp : 1, /* Conn is being processed */ 139 conn_dontroute : 1, /* SO_DONTROUTE state */ 140 conn_loopback : 1, /* SO_LOOPBACK state */ 141 conn_broadcast : 1, /* SO_BROADCAST state */ 142 143 conn_reuseaddr : 1, /* SO_REUSEADDR state */ 144 conn_multicast_loop : 1, /* IP_MULTICAST_LOOP */ 145 conn_multi_router : 1, /* Wants all multicast pkts */ 146 conn_draining : 1, /* ip_wsrv running */ 147 148 conn_did_putbq : 1, /* ip_wput did a putbq */ 149 conn_unspec_src : 1, /* IP_UNSPEC_SRC */ 150 conn_policy_cached : 1, /* Is policy cached/latched ? */ 151 conn_in_enforce_policy : 1, /* Enforce Policy on inbound */ 152 153 conn_out_enforce_policy : 1, /* Enforce Policy on outbound */ 154 conn_af_isv6 : 1, /* ip address family ver 6 */ 155 conn_pkt_isv6 : 1, /* ip packet format ver 6 */ 156 conn_ipv6_recvpktinfo : 1, /* IPV6_RECVPKTINFO option */ 157 158 conn_ipv6_recvhoplimit : 1, /* IPV6_RECVHOPLIMIT option */ 159 conn_ipv6_recvhopopts : 1, /* IPV6_RECVHOPOPTS option */ 160 conn_ipv6_recvdstopts : 1, /* IPV6_RECVDSTOPTS option */ 161 conn_ipv6_recvrthdr : 1, /* IPV6_RECVRTHDR option */ 162 163 conn_ipv6_recvrtdstopts : 1, /* IPV6_RECVRTHDRDSTOPTS */ 164 conn_ipv6_v6only : 1, /* IPV6_V6ONLY */ 165 conn_ipv6_recvtclass : 1, /* IPV6_RECVTCLASS */ 166 conn_ipv6_recvpathmtu : 1, /* IPV6_RECVPATHMTU */ 167 168 conn_pathmtu_valid : 1, /* The cached mtu is valid. */ 169 conn_ipv6_dontfrag : 1, /* IPV6_DONTFRAG */ 170 conn_fully_bound : 1, /* Fully bound connection */ 171 conn_recvif : 1, /* IP_RECVIF option */ 172 173 conn_recvslla : 1, /* IP_RECVSLLA option */ 174 conn_mdt_ok : 1, /* MDT is permitted */ 175 conn_nexthop_set : 1, 176 conn_allzones : 1; /* SO_ALLZONES */ 177 178 tcp_t *conn_tcp; /* Pointer to the tcp struct */ 179 struct udp_s *conn_udp; /* Pointer to the udp struct */ 180 181 squeue_t *conn_sqp; /* Squeue for processing */ 182 edesc_rpf conn_recv; /* Pointer to recv routine */ 183 void *conn_pad1; 184 185 ill_t *conn_xmit_if_ill; /* Outbound ill */ 186 ill_t *conn_nofailover_ill; /* Failover ill */ 187 ipsec_latch_t *conn_latch; /* latched state */ 188 ill_t *conn_outgoing_ill; /* IP{,V6}_BOUND_IF */ 189 edesc_spf conn_send; /* Pointer to send routine */ 190 queue_t *conn_rq; /* Read queue */ 191 queue_t *conn_wq; /* Write queue */ 192 dev_t conn_dev; /* Minor number */ 193 194 cred_t *conn_cred; /* Credentials */ 195 connf_t *conn_g_fanout; /* Global Hash bucket head */ 196 struct conn_s *conn_g_next; /* Global Hash chain next */ 197 struct conn_s *conn_g_prev; /* Global Hash chain prev */ 198 struct ipsec_policy_head_s *conn_policy; /* Configured policy */ 199 in6_addr_t conn_bound_source_v6; 200 #define conn_bound_source V4_PART_OF_V6(conn_bound_source_v6) 201 void *conn_void[1]; 202 203 connf_t *conn_fanout; /* Hash bucket we're part of */ 204 struct conn_s *conn_next; /* Hash chain next */ 205 struct conn_s *conn_prev; /* Hash chain prev */ 206 struct { 207 in6_addr_t connua_laddr; /* Local address */ 208 in6_addr_t connua_faddr; /* Remote address */ 209 } connua_v6addr; 210 #define conn_src V4_PART_OF_V6(connua_v6addr.connua_laddr) 211 #define conn_rem V4_PART_OF_V6(connua_v6addr.connua_faddr) 212 #define conn_srcv6 connua_v6addr.connua_laddr 213 #define conn_remv6 connua_v6addr.connua_faddr 214 union { 215 /* Used for classifier match performance */ 216 uint32_t conn_ports2; 217 struct { 218 in_port_t tcpu_fport; /* Remote port */ 219 in_port_t tcpu_lport; /* Local port */ 220 } tcpu_ports; 221 } u_port; 222 #define conn_fport u_port.tcpu_ports.tcpu_fport 223 #define conn_lport u_port.tcpu_ports.tcpu_lport 224 #define conn_ports u_port.conn_ports2 225 #define conn_upq conn_rq 226 uint8_t conn_ulp; /* protocol type */ 227 uint8_t conn_unused_byte; 228 kcondvar_t conn_cv; 229 230 uint_t conn_proto; /* SO_PROTOTYPE state */ 231 ill_t *conn_incoming_ill; /* IP{,V6}_BOUND_IF */ 232 ill_t *conn_outgoing_pill; /* IP{,V6}_BOUND_PIF */ 233 ill_t *conn_oper_pending_ill; /* pending shared ioctl */ 234 ill_t *conn_xioctl_pending_ill; /* pending excl ioctl */ 235 236 /* this is used only when an unbind is in progress.. */ 237 struct sq_s *conn_pending_sq; /* waiting for ioctl on sq */ 238 ilg_t *conn_ilg; /* Group memberships */ 239 int conn_ilg_allocated; /* Number allocated */ 240 int conn_ilg_inuse; /* Number currently used */ 241 int conn_ilg_walker_cnt; /* No of ilg walkers */ 242 /* XXXX get rid of this, once ilg_delete_all is fixed */ 243 kcondvar_t conn_refcv; 244 245 struct ipif_s *conn_multicast_ipif; /* IP_MULTICAST_IF */ 246 ill_t *conn_multicast_ill; /* IPV6_MULTICAST_IF */ 247 int conn_orig_bound_ifindex; /* BOUND_IF before MOVE */ 248 int conn_orig_multicast_ifindex; 249 /* IPv6 MC IF before MOVE */ 250 int conn_orig_xmit_ifindex; /* IP_XMIT_IF before move */ 251 struct conn_s *conn_drain_next; /* Next conn in drain list */ 252 struct conn_s *conn_drain_prev; /* Prev conn in drain list */ 253 idl_t *conn_idl; /* Ptr to the drain list head */ 254 mblk_t *conn_ipsec_opt_mp; /* ipsec option mblk */ 255 uint32_t conn_src_preferences; /* prefs for src addr select */ 256 /* mtuinfo from IPV6_PACKET_TOO_BIG conditional on conn_pathmtu_valid */ 257 struct ip6_mtuinfo mtuinfo; 258 zoneid_t conn_zoneid; /* zone connection is in */ 259 in6_addr_t conn_nexthop_v6; /* nexthop IP address */ 260 #define conn_nexthop_v4 V4_PART_OF_V6(conn_nexthop_v6) 261 cred_t *conn_peercred; /* Peer credentials, if any */ 262 263 unsigned int 264 conn_ulp_labeled : 1, /* ULP label is synced */ 265 conn_mlp_type : 2, /* mlp_type_t; tsol/tndb.h */ 266 conn_anon_mlp : 1, /* user wants anon MLP */ 267 268 conn_anon_port : 1, /* user bound anonymously */ 269 conn_mac_exempt : 1, /* unlabeled with loose MAC */ 270 conn_spare : 26; 271 272 #ifdef CONN_DEBUG 273 #define CONN_TRACE_MAX 10 274 int conn_trace_last; /* ndx of last used tracebuf */ 275 conn_trace_t conn_trace_buf[CONN_TRACE_MAX]; 276 #endif 277 }; 278 279 #define CONN_CRED(connp) ((connp)->conn_peercred == NULL ? \ 280 (connp)->conn_cred : (connp)->conn_peercred) 281 #define BEST_CRED(mp, connp) ((DB_CRED(mp) != NULL && \ 282 crgetlabel(DB_CRED(mp)) != NULL) ? DB_CRED(mp) : CONN_CRED(connp)) 283 284 /* 285 * connf_t - connection fanout data. 286 * 287 * The hash tables and their linkage (conn_t.{hashnextp, hashprevp} are 288 * protected by the per-bucket lock. Each conn_t inserted in the list 289 * points back at the connf_t that heads the bucket. 290 */ 291 292 struct connf_s { 293 struct conn_s *connf_head; 294 kmutex_t connf_lock; 295 }; 296 297 #define CONN_INC_REF(connp) { \ 298 mutex_enter(&(connp)->conn_lock); \ 299 DTRACE_PROBE1(conn__inc__ref, conn_t *, connp); \ 300 ASSERT(conn_trace_ref(connp)); \ 301 (connp)->conn_ref++; \ 302 ASSERT((connp)->conn_ref != 0); \ 303 mutex_exit(&(connp)->conn_lock); \ 304 } 305 306 #define CONN_INC_REF_LOCKED(connp) { \ 307 DTRACE_PROBE1(conn__inc__ref, conn_t *, connp); \ 308 ASSERT(MUTEX_HELD(&(connp)->conn_lock)); \ 309 ASSERT(conn_trace_ref(connp)); \ 310 (connp)->conn_ref++; \ 311 ASSERT((connp)->conn_ref != 0); \ 312 } 313 314 #define CONN_DEC_REF(connp) { \ 315 mutex_enter(&(connp)->conn_lock); \ 316 DTRACE_PROBE1(conn__dec__ref, conn_t *, connp); \ 317 /* \ 318 * The squeue framework always does a CONN_DEC_REF after return \ 319 * from TCP. Hence the refcnt must be at least 2 if conn_on_sqp \ 320 * is B_TRUE and conn_ref is being decremented. This is to \ 321 * account for the mblk being currently processed. \ 322 */ \ 323 if ((connp)->conn_ref <= 0 || \ 324 ((connp)->conn_ref == 1 && (connp)->conn_on_sqp)) \ 325 cmn_err(CE_PANIC, "CONN_DEC_REF: connp(%p) has ref " \ 326 "= %d\n", (void *)(connp), (connp)->conn_ref); \ 327 ASSERT(conn_untrace_ref(connp)); \ 328 (connp)->conn_ref--; \ 329 if ((connp)->conn_ref == 0) { \ 330 /* Refcnt can't increase again, safe to drop lock */ \ 331 mutex_exit(&(connp)->conn_lock); \ 332 ipcl_conn_destroy(connp); \ 333 } else { \ 334 cv_broadcast(&(connp)->conn_cv); \ 335 mutex_exit(&(connp)->conn_lock); \ 336 } \ 337 } 338 339 /* 340 * For use with subsystems within ip which use ALL_ZONES as a wildcard 341 */ 342 #define IPCL_ZONEID(connp) \ 343 ((connp)->conn_allzones ? ALL_ZONES : (connp)->conn_zoneid) 344 345 /* 346 * For matching between a conn_t and a zoneid. 347 */ 348 #define IPCL_ZONE_MATCH(connp, zoneid) \ 349 (((connp)->conn_allzones) || \ 350 ((zoneid) == ALL_ZONES) || \ 351 (connp)->conn_zoneid == (zoneid)) 352 353 354 #define _IPCL_V4_MATCH(v6addr, v4addr) \ 355 (V4_PART_OF_V6((v6addr)) == (v4addr) && IN6_IS_ADDR_V4MAPPED(&(v6addr))) 356 357 #define _IPCL_V4_MATCH_ANY(addr) \ 358 (IN6_IS_ADDR_V4MAPPED_ANY(&(addr)) || IN6_IS_ADDR_UNSPECIFIED(&(addr))) 359 360 361 /* 362 * IPCL_PROTO_MATCH() only matches conns with the specified zoneid, while 363 * IPCL_PROTO_MATCH_V6() can match other conns in the multicast case, see 364 * ip_fanout_proto(). 365 */ 366 #define IPCL_PROTO_MATCH(connp, protocol, ipha, ill, \ 367 fanout_flags, zoneid) \ 368 ((((connp)->conn_src == INADDR_ANY) || \ 369 (((connp)->conn_src == ((ipha)->ipha_dst)) && \ 370 (((connp)->conn_rem == INADDR_ANY) || \ 371 ((connp)->conn_rem == ((ipha)->ipha_src))))) && \ 372 IPCL_ZONE_MATCH(connp, zoneid) && \ 373 (conn_wantpacket((connp), (ill), (ipha), (fanout_flags), \ 374 (zoneid)) || ((protocol) == IPPROTO_PIM) || \ 375 ((protocol) == IPPROTO_RSVP))) 376 377 #define IPCL_PROTO_MATCH_V6(connp, protocol, ip6h, ill, \ 378 fanout_flags, zoneid) \ 379 ((IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_srcv6) || \ 380 (IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &((ip6h)->ip6_dst)) && \ 381 (IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_remv6) || \ 382 IN6_ARE_ADDR_EQUAL(&(connp)->conn_remv6, &((ip6h)->ip6_src))))) && \ 383 (conn_wantpacket_v6((connp), (ill), (ip6h), \ 384 (fanout_flags), (zoneid)) || ((protocol) == IPPROTO_RSVP))) 385 386 #define IPCL_CONN_HASH(src, ports) \ 387 ((unsigned)(ntohl((src)) ^ ((ports) >> 24) ^ ((ports) >> 16) ^ \ 388 ((ports) >> 8) ^ (ports)) % ipcl_conn_fanout_size) 389 390 #define IPCL_CONN_HASH_V6(src, ports) \ 391 IPCL_CONN_HASH(V4_PART_OF_V6((src)), (ports)) 392 393 #define IPCL_CONN_MATCH(connp, proto, src, dst, ports) \ 394 ((connp)->conn_ulp == (proto) && \ 395 (connp)->conn_ports == (ports) && \ 396 _IPCL_V4_MATCH((connp)->conn_remv6, (src)) && \ 397 _IPCL_V4_MATCH((connp)->conn_srcv6, (dst)) && \ 398 !(connp)->conn_ipv6_v6only) 399 400 #define IPCL_CONN_MATCH_V6(connp, proto, src, dst, ports) \ 401 ((connp)->conn_ulp == (proto) && \ 402 (connp)->conn_ports == (ports) && \ 403 IN6_ARE_ADDR_EQUAL(&(connp)->conn_remv6, &(src)) && \ 404 IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &(dst))) 405 406 #define IPCL_CONN_INIT(connp, protocol, src, rem, ports) { \ 407 (connp)->conn_ulp = protocol; \ 408 IN6_IPADDR_TO_V4MAPPED(src, &(connp)->conn_srcv6); \ 409 IN6_IPADDR_TO_V4MAPPED(rem, &(connp)->conn_remv6); \ 410 (connp)->conn_ports = ports; \ 411 } 412 413 #define IPCL_CONN_INIT_V6(connp, protocol, src, rem, ports) { \ 414 (connp)->conn_ulp = protocol; \ 415 (connp)->conn_srcv6 = src; \ 416 (connp)->conn_remv6 = rem; \ 417 (connp)->conn_ports = ports; \ 418 } 419 420 #define IPCL_PORT_HASH(port, size) \ 421 ((((port) >> 8) ^ (port)) & ((size) - 1)) 422 423 #define IPCL_BIND_HASH(lport) IPCL_PORT_HASH(lport, ipcl_bind_fanout_size) 424 425 #define IPCL_BIND_MATCH(connp, proto, laddr, lport) \ 426 ((connp)->conn_ulp == (proto) && \ 427 (connp)->conn_lport == (lport) && \ 428 (_IPCL_V4_MATCH_ANY((connp)->conn_srcv6) || \ 429 _IPCL_V4_MATCH((connp)->conn_srcv6, (laddr))) && \ 430 !(connp)->conn_ipv6_v6only) 431 432 #define IPCL_BIND_MATCH_V6(connp, proto, laddr, lport) \ 433 ((connp)->conn_ulp == (proto) && \ 434 (connp)->conn_lport == (lport) && \ 435 (IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &(laddr)) || \ 436 IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_srcv6))) 437 438 #define IPCL_UDP_MATCH(connp, lport, laddr, fport, faddr) \ 439 (((connp)->conn_lport == (lport)) && \ 440 ((_IPCL_V4_MATCH_ANY((connp)->conn_srcv6) || \ 441 (_IPCL_V4_MATCH((connp)->conn_srcv6, (laddr)) && \ 442 (_IPCL_V4_MATCH_ANY((connp)->conn_remv6) || \ 443 (_IPCL_V4_MATCH((connp)->conn_remv6, (faddr)) && \ 444 (connp)->conn_fport == (fport)))))) && \ 445 !(connp)->conn_ipv6_v6only) 446 447 #define IPCL_UDP_MATCH_V6(connp, lport, laddr, fport, faddr) \ 448 (((connp)->conn_lport == (lport)) && \ 449 (IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_srcv6) || \ 450 (IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &(laddr)) && \ 451 (IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_remv6) || \ 452 (IN6_ARE_ADDR_EQUAL(&(connp)->conn_remv6, &(faddr)) && \ 453 (connp)->conn_fport == (fport)))))) 454 455 #define IPCL_TCP_EAGER_INIT(connp, protocol, src, rem, ports) { \ 456 (connp)->conn_flags |= (IPCL_TCP4|IPCL_EAGER); \ 457 (connp)->conn_ulp = protocol; \ 458 IN6_IPADDR_TO_V4MAPPED(src, &(connp)->conn_srcv6); \ 459 IN6_IPADDR_TO_V4MAPPED(rem, &(connp)->conn_remv6); \ 460 (connp)->conn_ports = ports; \ 461 (connp)->conn_send = ip_output; \ 462 (connp)->conn_sqp = IP_SQUEUE_GET(lbolt); \ 463 } 464 465 #define IPCL_TCP_EAGER_INIT_V6(connp, protocol, src, rem, ports) { \ 466 (connp)->conn_flags |= (IPCL_TCP6|IPCL_EAGER); \ 467 (connp)->conn_ulp = protocol; \ 468 (connp)->conn_srcv6 = src; \ 469 (connp)->conn_remv6 = rem; \ 470 (connp)->conn_ports = ports; \ 471 (connp)->conn_send = ip_output_v6; \ 472 (connp)->conn_sqp = IP_SQUEUE_GET(lbolt); \ 473 } 474 475 #define ipcl_proto_search(protocol) \ 476 (ipcl_proto_fanout[(protocol)].connf_head) 477 478 #define IPCL_UDP_HASH(lport) IPCL_PORT_HASH(lport, ipcl_udp_fanout_size) 479 480 #define CONN_G_HASH_SIZE 1024 481 482 /* Raw socket hash function. */ 483 #define IPCL_RAW_HASH(lport) IPCL_PORT_HASH(lport, ipcl_raw_fanout_size) 484 485 /* 486 * This is similar to IPCL_BIND_MATCH except that the local port check 487 * is changed to a wildcard port check. 488 */ 489 #define IPCL_RAW_MATCH(connp, proto, laddr) \ 490 ((connp)->conn_ulp == (proto) && \ 491 (connp)->conn_lport == 0 && \ 492 (_IPCL_V4_MATCH_ANY((connp)->conn_srcv6) || \ 493 _IPCL_V4_MATCH((connp)->conn_srcv6, (laddr)))) 494 495 #define IPCL_RAW_MATCH_V6(connp, proto, laddr) \ 496 ((connp)->conn_ulp == (proto) && \ 497 (connp)->conn_lport == 0 && \ 498 (IN6_IS_ADDR_UNSPECIFIED(&(connp)->conn_srcv6) || \ 499 IN6_ARE_ADDR_EQUAL(&(connp)->conn_srcv6, &(laddr)))) 500 501 /* hash tables */ 502 extern connf_t rts_clients; 503 extern connf_t *ipcl_conn_fanout; 504 extern connf_t *ipcl_bind_fanout; 505 extern connf_t ipcl_proto_fanout[IPPROTO_MAX + 1]; 506 extern connf_t ipcl_proto_fanout_v6[IPPROTO_MAX + 1]; 507 extern connf_t *ipcl_udp_fanout; 508 extern connf_t *ipcl_globalhash_fanout; 509 extern connf_t *ipcl_raw_fanout; 510 extern uint_t ipcl_conn_fanout_size; 511 extern uint_t ipcl_bind_fanout_size; 512 extern uint_t ipcl_udp_fanout_size; 513 extern uint_t ipcl_raw_fanout_size; 514 515 /* Function prototypes */ 516 extern void ipcl_init(void); 517 extern void ipcl_destroy(void); 518 extern conn_t *ipcl_conn_create(uint32_t, int); 519 extern void ipcl_conn_destroy(conn_t *); 520 521 void ipcl_hash_insert_connected(connf_t *, conn_t *); 522 void ipcl_hash_insert_bound(connf_t *, conn_t *); 523 void ipcl_hash_insert_wildcard(connf_t *, conn_t *); 524 void ipcl_hash_remove(conn_t *); 525 void ipcl_hash_remove_locked(conn_t *connp, connf_t *connfp); 526 527 extern int ipcl_bind_insert(conn_t *, uint8_t, ipaddr_t, uint16_t); 528 extern int ipcl_bind_insert_v6(conn_t *, uint8_t, const in6_addr_t *, 529 uint16_t); 530 extern int ipcl_conn_insert(conn_t *, uint8_t, ipaddr_t, ipaddr_t, 531 uint32_t); 532 extern int ipcl_conn_insert_v6(conn_t *, uint8_t, const in6_addr_t *, 533 const in6_addr_t *, uint32_t, uint_t); 534 extern conn_t *ipcl_get_next_conn(connf_t *, conn_t *, uint32_t); 535 536 void ipcl_proto_insert(conn_t *, uint8_t); 537 void ipcl_proto_insert_v6(conn_t *, uint8_t); 538 conn_t *ipcl_classify_v4(mblk_t *, uint8_t, uint_t, zoneid_t); 539 conn_t *ipcl_classify_v6(mblk_t *, uint8_t, uint_t, zoneid_t); 540 conn_t *ipcl_classify(mblk_t *, zoneid_t); 541 conn_t *ipcl_classify_raw(mblk_t *, uint8_t, zoneid_t, uint32_t, ipha_t *); 542 void ipcl_globalhash_insert(conn_t *); 543 void ipcl_globalhash_remove(conn_t *); 544 void ipcl_walk(pfv_t, void *); 545 conn_t *ipcl_tcp_lookup_reversed_ipv4(ipha_t *, tcph_t *, int); 546 conn_t *ipcl_tcp_lookup_reversed_ipv6(ip6_t *, tcpha_t *, int, uint_t); 547 conn_t *ipcl_lookup_listener_v4(uint16_t, ipaddr_t, zoneid_t); 548 conn_t *ipcl_lookup_listener_v6(uint16_t, in6_addr_t *, uint_t, zoneid_t); 549 int conn_trace_ref(conn_t *); 550 int conn_untrace_ref(conn_t *); 551 conn_t *ipcl_conn_tcp_lookup_reversed_ipv4(conn_t *, ipha_t *, tcph_t *); 552 conn_t *ipcl_conn_tcp_lookup_reversed_ipv6(conn_t *, ip6_t *, tcph_t *); 553 #ifdef __cplusplus 554 } 555 #endif 556 557 #endif /* _INET_IPCLASSIFIER_H */ 558