Print this page
inet_pton
Split |
Close |
Expand all |
Collapse all |
--- old/usr/src/uts/common/inet/ip.h
+++ new/usr/src/uts/common/inet/ip.h
1 1 /*
2 2 * CDDL HEADER START
3 3 *
4 4 * The contents of this file are subject to the terms of the
5 5 * Common Development and Distribution License (the "License").
6 6 * You may not use this file except in compliance with the License.
7 7 *
8 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 9 * or http://www.opensolaris.org/os/licensing.
10 10 * See the License for the specific language governing permissions
11 11 * and limitations under the License.
12 12 *
13 13 * When distributing Covered Code, include this CDDL HEADER in each
14 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 15 * If applicable, add the following below this CDDL HEADER, with the
↓ open down ↓ |
15 lines elided |
↑ open up ↑ |
16 16 * fields enclosed by brackets "[]" replaced with your own identifying
17 17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 18 *
19 19 * CDDL HEADER END
20 20 */
21 21
22 22 /*
23 23 * Copyright (c) 1991, 2010, Oracle and/or its affiliates. All rights reserved.
24 24 * Copyright (c) 1990 Mentat Inc.
25 25 */
26 +/*
27 + * Copyright 2012 Nexenta Systems, Inc. All rights reserved.
28 + */
26 29
27 30 #ifndef _INET_IP_H
28 31 #define _INET_IP_H
29 32
30 33 #ifdef __cplusplus
31 34 extern "C" {
32 35 #endif
33 36
34 37 #include <sys/isa_defs.h>
35 38 #include <sys/types.h>
36 39 #include <inet/mib2.h>
37 40 #include <inet/nd.h>
38 41 #include <sys/atomic.h>
39 42 #include <net/if_dl.h>
40 43 #include <net/if.h>
41 44 #include <netinet/ip.h>
42 45 #include <netinet/igmp.h>
43 46 #include <sys/neti.h>
44 47 #include <sys/hook.h>
45 48 #include <sys/hook_event.h>
46 49 #include <sys/hook_impl.h>
47 50 #include <inet/ip_stack.h>
48 51
49 52 #ifdef _KERNEL
50 53 #include <netinet/ip6.h>
51 54 #include <sys/avl.h>
52 55 #include <sys/list.h>
53 56 #include <sys/vmem.h>
54 57 #include <sys/squeue.h>
55 58 #include <net/route.h>
56 59 #include <sys/systm.h>
57 60 #include <net/radix.h>
58 61 #include <sys/modhash.h>
59 62
60 63 #ifdef DEBUG
61 64 #define CONN_DEBUG
62 65 #endif
63 66
64 67 #define IP_DEBUG
65 68 /*
66 69 * The mt-streams(9F) flags for the IP module; put here so that other
67 70 * "drivers" that are actually IP (e.g., ICMP, UDP) can use the same set
68 71 * of flags.
69 72 */
70 73 #define IP_DEVMTFLAGS D_MP
71 74 #endif /* _KERNEL */
72 75
73 76 #define IP_MOD_NAME "ip"
74 77 #define IP_DEV_NAME "/dev/ip"
75 78 #define IP6_DEV_NAME "/dev/ip6"
76 79
77 80 #define UDP_MOD_NAME "udp"
78 81 #define UDP_DEV_NAME "/dev/udp"
79 82 #define UDP6_DEV_NAME "/dev/udp6"
80 83
81 84 #define TCP_MOD_NAME "tcp"
82 85 #define TCP_DEV_NAME "/dev/tcp"
83 86 #define TCP6_DEV_NAME "/dev/tcp6"
84 87
85 88 #define SCTP_MOD_NAME "sctp"
86 89
87 90 #ifndef _IPADDR_T
88 91 #define _IPADDR_T
89 92 typedef uint32_t ipaddr_t;
90 93 #endif
91 94
92 95 /* Number of bits in an address */
93 96 #define IP_ABITS 32
94 97 #define IPV4_ABITS IP_ABITS
95 98 #define IPV6_ABITS 128
96 99 #define IP_MAX_HW_LEN 40
97 100
98 101 #define IP_HOST_MASK (ipaddr_t)0xffffffffU
99 102
100 103 #define IP_CSUM(mp, off, sum) (~ip_cksum(mp, off, sum) & 0xFFFF)
101 104 #define IP_CSUM_PARTIAL(mp, off, sum) ip_cksum(mp, off, sum)
102 105 #define IP_BCSUM_PARTIAL(bp, len, sum) bcksum(bp, len, sum)
103 106
104 107 #define ILL_FRAG_HASH_TBL_COUNT ((unsigned int)64)
105 108 #define ILL_FRAG_HASH_TBL_SIZE (ILL_FRAG_HASH_TBL_COUNT * sizeof (ipfb_t))
106 109
107 110 #define IPV4_ADDR_LEN 4
108 111 #define IP_ADDR_LEN IPV4_ADDR_LEN
109 112 #define IP_ARP_PROTO_TYPE 0x0800
110 113
111 114 #define IPV4_VERSION 4
112 115 #define IP_VERSION IPV4_VERSION
113 116 #define IP_SIMPLE_HDR_LENGTH_IN_WORDS 5
114 117 #define IP_SIMPLE_HDR_LENGTH 20
115 118 #define IP_MAX_HDR_LENGTH 60
116 119
117 120 #define IP_MAX_OPT_LENGTH (IP_MAX_HDR_LENGTH-IP_SIMPLE_HDR_LENGTH)
118 121
119 122 #define IP_MIN_MTU (IP_MAX_HDR_LENGTH + 8) /* 68 bytes */
120 123
121 124 /*
122 125 * XXX IP_MAXPACKET is defined in <netinet/ip.h> as well. At some point the
123 126 * 2 files should be cleaned up to remove all redundant definitions.
124 127 */
125 128 #define IP_MAXPACKET 65535
126 129 #define IP_SIMPLE_HDR_VERSION \
127 130 ((IP_VERSION << 4) | IP_SIMPLE_HDR_LENGTH_IN_WORDS)
128 131
129 132 #define UDPH_SIZE 8
130 133
131 134 /*
132 135 * Constants and type definitions to support IP IOCTL commands
133 136 */
134 137 #define IP_IOCTL (('i'<<8)|'p')
135 138 #define IP_IOC_IRE_DELETE 4
136 139 #define IP_IOC_IRE_DELETE_NO_REPLY 5
137 140 #define IP_IOC_RTS_REQUEST 7
138 141
139 142 /* Common definitions used by IP IOCTL data structures */
140 143 typedef struct ipllcmd_s {
141 144 uint_t ipllc_cmd;
142 145 uint_t ipllc_name_offset;
143 146 uint_t ipllc_name_length;
144 147 } ipllc_t;
145 148
146 149 /* IP IRE Delete Command Structure. */
147 150 typedef struct ipid_s {
148 151 ipllc_t ipid_ipllc;
149 152 uint_t ipid_ire_type;
150 153 uint_t ipid_addr_offset;
151 154 uint_t ipid_addr_length;
152 155 uint_t ipid_mask_offset;
153 156 uint_t ipid_mask_length;
154 157 } ipid_t;
155 158
156 159 #define ipid_cmd ipid_ipllc.ipllc_cmd
157 160
158 161 #ifdef _KERNEL
159 162 /*
160 163 * Temporary state for ip options parser.
161 164 */
162 165 typedef struct ipoptp_s
163 166 {
164 167 uint8_t *ipoptp_next; /* next option to look at */
165 168 uint8_t *ipoptp_end; /* end of options */
166 169 uint8_t *ipoptp_cur; /* start of current option */
167 170 uint8_t ipoptp_len; /* length of current option */
168 171 uint32_t ipoptp_flags;
169 172 } ipoptp_t;
170 173
171 174 /*
172 175 * Flag(s) for ipoptp_flags
173 176 */
174 177 #define IPOPTP_ERROR 0x00000001
175 178 #endif /* _KERNEL */
176 179
177 180 /* Controls forwarding of IP packets, set via ipadm(1M)/ndd(1M) */
178 181 #define IP_FORWARD_NEVER 0
179 182 #define IP_FORWARD_ALWAYS 1
180 183
181 184 #define WE_ARE_FORWARDING(ipst) ((ipst)->ips_ip_forwarding == IP_FORWARD_ALWAYS)
182 185
183 186 #define IPH_HDR_LENGTH(ipha) \
184 187 ((int)(((ipha_t *)ipha)->ipha_version_and_hdr_length & 0xF) << 2)
185 188
186 189 #define IPH_HDR_VERSION(ipha) \
187 190 ((int)(((ipha_t *)ipha)->ipha_version_and_hdr_length) >> 4)
188 191
189 192 #ifdef _KERNEL
190 193 /*
191 194 * IP reassembly macros. We hide starting and ending offsets in b_next and
192 195 * b_prev of messages on the reassembly queue. The messages are chained using
193 196 * b_cont. These macros are used in ip_reassemble() so we don't have to see
194 197 * the ugly casts and assignments.
195 198 * Note that the offsets are <= 64k i.e. a uint_t is sufficient to represent
196 199 * them.
197 200 */
198 201 #define IP_REASS_START(mp) ((uint_t)(uintptr_t)((mp)->b_next))
199 202 #define IP_REASS_SET_START(mp, u) \
200 203 ((mp)->b_next = (mblk_t *)(uintptr_t)(u))
201 204 #define IP_REASS_END(mp) ((uint_t)(uintptr_t)((mp)->b_prev))
202 205 #define IP_REASS_SET_END(mp, u) \
203 206 ((mp)->b_prev = (mblk_t *)(uintptr_t)(u))
204 207
205 208 #define IP_REASS_COMPLETE 0x1
206 209 #define IP_REASS_PARTIAL 0x2
207 210 #define IP_REASS_FAILED 0x4
208 211
209 212 /*
210 213 * Test to determine whether this is a module instance of IP or a
211 214 * driver instance of IP.
212 215 */
213 216 #define CONN_Q(q) (WR(q)->q_next == NULL)
214 217
215 218 #define Q_TO_CONN(q) ((conn_t *)(q)->q_ptr)
216 219 #define Q_TO_TCP(q) (Q_TO_CONN((q))->conn_tcp)
217 220 #define Q_TO_UDP(q) (Q_TO_CONN((q))->conn_udp)
218 221 #define Q_TO_ICMP(q) (Q_TO_CONN((q))->conn_icmp)
219 222 #define Q_TO_RTS(q) (Q_TO_CONN((q))->conn_rts)
220 223
221 224 #define CONNP_TO_WQ(connp) ((connp)->conn_wq)
222 225 #define CONNP_TO_RQ(connp) ((connp)->conn_rq)
223 226
224 227 #define GRAB_CONN_LOCK(q) { \
225 228 if (q != NULL && CONN_Q(q)) \
226 229 mutex_enter(&(Q_TO_CONN(q))->conn_lock); \
227 230 }
228 231
229 232 #define RELEASE_CONN_LOCK(q) { \
230 233 if (q != NULL && CONN_Q(q)) \
231 234 mutex_exit(&(Q_TO_CONN(q))->conn_lock); \
232 235 }
233 236
234 237 /*
235 238 * Ref counter macros for ioctls. This provides a guard for TCP to stop
236 239 * tcp_close from removing the rq/wq whilst an ioctl is still in flight on the
237 240 * stream. The ioctl could have been queued on e.g. an ipsq. tcp_close will wait
238 241 * until the ioctlref count is zero before proceeding.
239 242 * Ideally conn_oper_pending_ill would be used for this purpose. However, in the
240 243 * case where an ioctl is aborted or interrupted, it can be cleared prematurely.
241 244 * There are also some race possibilities between ip and the stream head which
242 245 * can also end up with conn_oper_pending_ill being cleared prematurely. So, to
243 246 * avoid these situations, we use a dedicated ref counter for ioctls which is
244 247 * used in addition to and in parallel with the normal conn_ref count.
245 248 */
246 249 #define CONN_INC_IOCTLREF_LOCKED(connp) { \
247 250 ASSERT(MUTEX_HELD(&(connp)->conn_lock)); \
248 251 DTRACE_PROBE1(conn__inc__ioctlref, conn_t *, (connp)); \
249 252 (connp)->conn_ioctlref++; \
250 253 mutex_exit(&(connp)->conn_lock); \
251 254 }
252 255
253 256 #define CONN_INC_IOCTLREF(connp) { \
254 257 mutex_enter(&(connp)->conn_lock); \
255 258 CONN_INC_IOCTLREF_LOCKED(connp); \
256 259 }
257 260
258 261 #define CONN_DEC_IOCTLREF(connp) { \
259 262 mutex_enter(&(connp)->conn_lock); \
260 263 DTRACE_PROBE1(conn__dec__ioctlref, conn_t *, (connp)); \
261 264 /* Make sure conn_ioctlref will not underflow. */ \
262 265 ASSERT((connp)->conn_ioctlref != 0); \
263 266 if ((--(connp)->conn_ioctlref == 0) && \
264 267 ((connp)->conn_state_flags & CONN_CLOSING)) { \
265 268 cv_broadcast(&(connp)->conn_cv); \
266 269 } \
267 270 mutex_exit(&(connp)->conn_lock); \
268 271 }
269 272
270 273
271 274 /*
272 275 * Complete the pending operation. Usually an ioctl. Can also
273 276 * be a bind or option management request that got enqueued
274 277 * in an ipsq_t. Called on completion of the operation.
275 278 */
276 279 #define CONN_OPER_PENDING_DONE(connp) { \
277 280 mutex_enter(&(connp)->conn_lock); \
278 281 (connp)->conn_oper_pending_ill = NULL; \
279 282 cv_broadcast(&(connp)->conn_refcv); \
280 283 mutex_exit(&(connp)->conn_lock); \
281 284 CONN_DEC_REF(connp); \
282 285 }
283 286
284 287 /*
285 288 * Values for squeue switch:
286 289 */
287 290 #define IP_SQUEUE_ENTER_NODRAIN 1
288 291 #define IP_SQUEUE_ENTER 2
289 292 #define IP_SQUEUE_FILL 3
290 293
291 294 extern int ip_squeue_flag;
292 295
293 296 /* IP Fragmentation Reassembly Header */
294 297 typedef struct ipf_s {
295 298 struct ipf_s *ipf_hash_next;
296 299 struct ipf_s **ipf_ptphn; /* Pointer to previous hash next. */
297 300 uint32_t ipf_ident; /* Ident to match. */
298 301 uint8_t ipf_protocol; /* Protocol to match. */
299 302 uchar_t ipf_last_frag_seen : 1; /* Last fragment seen ? */
300 303 time_t ipf_timestamp; /* Reassembly start time. */
301 304 mblk_t *ipf_mp; /* mblk we live in. */
302 305 mblk_t *ipf_tail_mp; /* Frag queue tail pointer. */
303 306 int ipf_hole_cnt; /* Number of holes (hard-case). */
304 307 int ipf_end; /* Tail end offset (0 -> hard-case). */
305 308 uint_t ipf_gen; /* Frag queue generation */
306 309 size_t ipf_count; /* Count of bytes used by frag */
307 310 uint_t ipf_nf_hdr_len; /* Length of nonfragmented header */
308 311 in6_addr_t ipf_v6src; /* IPv6 source address */
309 312 in6_addr_t ipf_v6dst; /* IPv6 dest address */
310 313 uint_t ipf_prev_nexthdr_offset; /* Offset for nexthdr value */
311 314 uint8_t ipf_ecn; /* ECN info for the fragments */
312 315 uint8_t ipf_num_dups; /* Number of times dup frags recvd */
313 316 uint16_t ipf_checksum_flags; /* Hardware checksum flags */
314 317 uint32_t ipf_checksum; /* Partial checksum of fragment data */
315 318 } ipf_t;
316 319
317 320 /*
318 321 * IPv4 Fragments
319 322 */
320 323 #define IS_V4_FRAGMENT(ipha_fragment_offset_and_flags) \
321 324 (((ntohs(ipha_fragment_offset_and_flags) & IPH_OFFSET) != 0) || \
322 325 ((ntohs(ipha_fragment_offset_and_flags) & IPH_MF) != 0))
323 326
324 327 #define ipf_src V4_PART_OF_V6(ipf_v6src)
325 328 #define ipf_dst V4_PART_OF_V6(ipf_v6dst)
326 329
327 330 #endif /* _KERNEL */
328 331
329 332 /* ICMP types */
330 333 #define ICMP_ECHO_REPLY 0
331 334 #define ICMP_DEST_UNREACHABLE 3
332 335 #define ICMP_SOURCE_QUENCH 4
333 336 #define ICMP_REDIRECT 5
334 337 #define ICMP_ECHO_REQUEST 8
335 338 #define ICMP_ROUTER_ADVERTISEMENT 9
336 339 #define ICMP_ROUTER_SOLICITATION 10
337 340 #define ICMP_TIME_EXCEEDED 11
338 341 #define ICMP_PARAM_PROBLEM 12
339 342 #define ICMP_TIME_STAMP_REQUEST 13
340 343 #define ICMP_TIME_STAMP_REPLY 14
341 344 #define ICMP_INFO_REQUEST 15
342 345 #define ICMP_INFO_REPLY 16
343 346 #define ICMP_ADDRESS_MASK_REQUEST 17
344 347 #define ICMP_ADDRESS_MASK_REPLY 18
345 348
346 349 /* Evaluates to true if the ICMP type is an ICMP error */
347 350 #define ICMP_IS_ERROR(type) ( \
348 351 (type) == ICMP_DEST_UNREACHABLE || \
349 352 (type) == ICMP_SOURCE_QUENCH || \
350 353 (type) == ICMP_TIME_EXCEEDED || \
351 354 (type) == ICMP_PARAM_PROBLEM)
352 355
353 356 /* ICMP_TIME_EXCEEDED codes */
354 357 #define ICMP_TTL_EXCEEDED 0
355 358 #define ICMP_REASSEMBLY_TIME_EXCEEDED 1
356 359
357 360 /* ICMP_DEST_UNREACHABLE codes */
358 361 #define ICMP_NET_UNREACHABLE 0
359 362 #define ICMP_HOST_UNREACHABLE 1
360 363 #define ICMP_PROTOCOL_UNREACHABLE 2
361 364 #define ICMP_PORT_UNREACHABLE 3
362 365 #define ICMP_FRAGMENTATION_NEEDED 4
363 366 #define ICMP_SOURCE_ROUTE_FAILED 5
364 367 #define ICMP_DEST_NET_UNKNOWN 6
365 368 #define ICMP_DEST_HOST_UNKNOWN 7
366 369 #define ICMP_SRC_HOST_ISOLATED 8
367 370 #define ICMP_DEST_NET_UNREACH_ADMIN 9
368 371 #define ICMP_DEST_HOST_UNREACH_ADMIN 10
369 372 #define ICMP_DEST_NET_UNREACH_TOS 11
370 373 #define ICMP_DEST_HOST_UNREACH_TOS 12
371 374
372 375 /* ICMP Header Structure */
373 376 typedef struct icmph_s {
374 377 uint8_t icmph_type;
375 378 uint8_t icmph_code;
376 379 uint16_t icmph_checksum;
377 380 union {
378 381 struct { /* ECHO request/response structure */
379 382 uint16_t u_echo_ident;
380 383 uint16_t u_echo_seqnum;
381 384 } u_echo;
382 385 struct { /* Destination unreachable structure */
383 386 uint16_t u_du_zero;
384 387 uint16_t u_du_mtu;
385 388 } u_du;
386 389 struct { /* Parameter problem structure */
387 390 uint8_t u_pp_ptr;
388 391 uint8_t u_pp_rsvd[3];
389 392 } u_pp;
390 393 struct { /* Redirect structure */
391 394 ipaddr_t u_rd_gateway;
392 395 } u_rd;
393 396 } icmph_u;
394 397 } icmph_t;
395 398
396 399 #define icmph_echo_ident icmph_u.u_echo.u_echo_ident
397 400 #define icmph_echo_seqnum icmph_u.u_echo.u_echo_seqnum
398 401 #define icmph_du_zero icmph_u.u_du.u_du_zero
399 402 #define icmph_du_mtu icmph_u.u_du.u_du_mtu
400 403 #define icmph_pp_ptr icmph_u.u_pp.u_pp_ptr
401 404 #define icmph_rd_gateway icmph_u.u_rd.u_rd_gateway
402 405
403 406 #define ICMPH_SIZE 8
404 407
405 408 /*
406 409 * Minimum length of transport layer header included in an ICMP error
407 410 * message for it to be considered valid.
408 411 */
409 412 #define ICMP_MIN_TP_HDR_LEN 8
410 413
411 414 /* Aligned IP header */
412 415 typedef struct ipha_s {
413 416 uint8_t ipha_version_and_hdr_length;
414 417 uint8_t ipha_type_of_service;
415 418 uint16_t ipha_length;
416 419 uint16_t ipha_ident;
417 420 uint16_t ipha_fragment_offset_and_flags;
418 421 uint8_t ipha_ttl;
419 422 uint8_t ipha_protocol;
420 423 uint16_t ipha_hdr_checksum;
421 424 ipaddr_t ipha_src;
422 425 ipaddr_t ipha_dst;
423 426 } ipha_t;
424 427
425 428 /*
426 429 * IP Flags
427 430 *
428 431 * Some of these constant names are copied for the DTrace IP provider in
429 432 * usr/src/lib/libdtrace/common/{ip.d.in, ip.sed.in}, which should be kept
430 433 * in sync.
431 434 */
432 435 #define IPH_DF 0x4000 /* Don't fragment */
433 436 #define IPH_MF 0x2000 /* More fragments to come */
434 437 #define IPH_OFFSET 0x1FFF /* Where the offset lives */
435 438
436 439 /* Byte-order specific values */
437 440 #ifdef _BIG_ENDIAN
438 441 #define IPH_DF_HTONS 0x4000 /* Don't fragment */
439 442 #define IPH_MF_HTONS 0x2000 /* More fragments to come */
440 443 #define IPH_OFFSET_HTONS 0x1FFF /* Where the offset lives */
441 444 #else
442 445 #define IPH_DF_HTONS 0x0040 /* Don't fragment */
443 446 #define IPH_MF_HTONS 0x0020 /* More fragments to come */
444 447 #define IPH_OFFSET_HTONS 0xFF1F /* Where the offset lives */
445 448 #endif
446 449
447 450 /* ECN code points for IPv4 TOS byte and IPv6 traffic class octet. */
448 451 #define IPH_ECN_NECT 0x0 /* Not ECN-Capable Transport */
449 452 #define IPH_ECN_ECT1 0x1 /* ECN-Capable Transport, ECT(1) */
450 453 #define IPH_ECN_ECT0 0x2 /* ECN-Capable Transport, ECT(0) */
451 454 #define IPH_ECN_CE 0x3 /* ECN-Congestion Experienced (CE) */
452 455
453 456 struct ill_s;
454 457
455 458 typedef void ip_v6intfid_func_t(struct ill_s *, in6_addr_t *);
456 459 typedef void ip_v6mapinfo_func_t(struct ill_s *, uchar_t *, uchar_t *);
457 460 typedef void ip_v4mapinfo_func_t(struct ill_s *, uchar_t *, uchar_t *);
458 461
459 462 /* IP Mac info structure */
460 463 typedef struct ip_m_s {
461 464 t_uscalar_t ip_m_mac_type; /* From <sys/dlpi.h> */
462 465 int ip_m_type; /* From <net/if_types.h> */
463 466 t_uscalar_t ip_m_ipv4sap;
464 467 t_uscalar_t ip_m_ipv6sap;
465 468 ip_v4mapinfo_func_t *ip_m_v4mapping;
466 469 ip_v6mapinfo_func_t *ip_m_v6mapping;
467 470 ip_v6intfid_func_t *ip_m_v6intfid;
468 471 ip_v6intfid_func_t *ip_m_v6destintfid;
469 472 } ip_m_t;
470 473
471 474 /*
472 475 * The following functions attempt to reduce the link layer dependency
473 476 * of the IP stack. The current set of link specific operations are:
474 477 * a. map from IPv4 class D (224.0/4) multicast address range or the
475 478 * IPv6 multicast address range (ff00::/8) to the link layer multicast
476 479 * address.
477 480 * b. derive the default IPv6 interface identifier from the interface.
478 481 * c. derive the default IPv6 destination interface identifier from
479 482 * the interface (point-to-point only).
480 483 */
481 484 extern void ip_mcast_mapping(struct ill_s *, uchar_t *, uchar_t *);
482 485 /* ip_m_v6*intfid return void and are never NULL */
483 486 #define MEDIA_V6INTFID(ip_m, ill, v6ptr) (ip_m)->ip_m_v6intfid(ill, v6ptr)
484 487 #define MEDIA_V6DESTINTFID(ip_m, ill, v6ptr) \
485 488 (ip_m)->ip_m_v6destintfid(ill, v6ptr)
486 489
487 490 /* Router entry types */
488 491 #define IRE_BROADCAST 0x0001 /* Route entry for broadcast address */
489 492 #define IRE_DEFAULT 0x0002 /* Route entry for default gateway */
490 493 #define IRE_LOCAL 0x0004 /* Route entry for local address */
491 494 #define IRE_LOOPBACK 0x0008 /* Route entry for loopback address */
492 495 #define IRE_PREFIX 0x0010 /* Route entry for prefix routes */
493 496 #ifndef _KERNEL
494 497 /* Keep so user-level still compiles */
495 498 #define IRE_CACHE 0x0020 /* Cached Route entry */
496 499 #endif
497 500 #define IRE_IF_NORESOLVER 0x0040 /* Route entry for local interface */
498 501 /* net without any address mapping. */
499 502 #define IRE_IF_RESOLVER 0x0080 /* Route entry for local interface */
500 503 /* net with resolver. */
501 504 #define IRE_HOST 0x0100 /* Host route entry */
502 505 /* Keep so user-level still compiles */
503 506 #define IRE_HOST_REDIRECT 0x0200 /* only used for T_SVR4_OPTMGMT_REQ */
504 507 #define IRE_IF_CLONE 0x0400 /* Per host clone of IRE_IF */
505 508 #define IRE_MULTICAST 0x0800 /* Special - not in table */
506 509 #define IRE_NOROUTE 0x1000 /* Special - not in table */
507 510
508 511 #define IRE_INTERFACE (IRE_IF_NORESOLVER | IRE_IF_RESOLVER)
509 512
510 513 #define IRE_IF_ALL (IRE_IF_NORESOLVER | IRE_IF_RESOLVER | \
511 514 IRE_IF_CLONE)
512 515 #define IRE_OFFSUBNET (IRE_DEFAULT | IRE_PREFIX | IRE_HOST)
513 516 #define IRE_OFFLINK IRE_OFFSUBNET
514 517 /*
515 518 * Note that we view IRE_NOROUTE as ONLINK since we can "send" to them without
516 519 * going through a router; the result of sending will be an error/icmp error.
517 520 */
518 521 #define IRE_ONLINK (IRE_IF_ALL|IRE_LOCAL|IRE_LOOPBACK| \
519 522 IRE_BROADCAST|IRE_MULTICAST|IRE_NOROUTE)
520 523
521 524 /* Arguments to ire_flush_cache() */
522 525 #define IRE_FLUSH_DELETE 0
523 526 #define IRE_FLUSH_ADD 1
524 527 #define IRE_FLUSH_GWCHANGE 2
525 528
526 529 /*
527 530 * Flags to ire_route_recursive
528 531 */
529 532 #define IRR_NONE 0
530 533 #define IRR_ALLOCATE 1 /* OK to allocate IRE_IF_CLONE */
531 534 #define IRR_INCOMPLETE 2 /* OK to return incomplete chain */
532 535
533 536 /*
534 537 * Open/close synchronization flags.
535 538 * These are kept in a separate field in the conn and the synchronization
536 539 * depends on the atomic 32 bit access to that field.
537 540 */
538 541 #define CONN_CLOSING 0x01 /* ip_close waiting for ip_wsrv */
539 542 #define CONN_CONDEMNED 0x02 /* conn is closing, no more refs */
540 543 #define CONN_INCIPIENT 0x04 /* conn not yet visible, no refs */
541 544 #define CONN_QUIESCED 0x08 /* conn is now quiescent */
542 545 #define CONN_UPDATE_ILL 0x10 /* conn_update_ill in progress */
543 546
544 547 /*
545 548 * Flags for dce_flags field. Specifies which information has been set.
546 549 * dce_ident is always present, but the other ones are identified by the flags.
547 550 */
548 551 #define DCEF_DEFAULT 0x0001 /* Default DCE - no pmtu or uinfo */
549 552 #define DCEF_PMTU 0x0002 /* Different than interface MTU */
550 553 #define DCEF_UINFO 0x0004 /* dce_uinfo set */
551 554 #define DCEF_TOO_SMALL_PMTU 0x0008 /* Smaller than IPv4/IPv6 MIN */
552 555
553 556 #ifdef _KERNEL
554 557 /*
555 558 * Extra structures need for per-src-addr filtering (IGMPv3/MLDv2)
556 559 */
557 560 #define MAX_FILTER_SIZE 64
558 561
559 562 typedef struct slist_s {
560 563 int sl_numsrc;
561 564 in6_addr_t sl_addr[MAX_FILTER_SIZE];
562 565 } slist_t;
563 566
564 567 /*
565 568 * Following struct is used to maintain retransmission state for
566 569 * a multicast group. One rtx_state_t struct is an in-line field
567 570 * of the ilm_t struct; the slist_ts in the rtx_state_t struct are
568 571 * alloc'd as needed.
569 572 */
570 573 typedef struct rtx_state_s {
571 574 uint_t rtx_timer; /* retrans timer */
572 575 int rtx_cnt; /* retrans count */
573 576 int rtx_fmode_cnt; /* retrans count for fmode change */
574 577 slist_t *rtx_allow;
575 578 slist_t *rtx_block;
576 579 } rtx_state_t;
577 580
578 581 /*
579 582 * Used to construct list of multicast address records that will be
580 583 * sent in a single listener report.
581 584 */
582 585 typedef struct mrec_s {
583 586 struct mrec_s *mrec_next;
584 587 uint8_t mrec_type;
585 588 uint8_t mrec_auxlen; /* currently unused */
586 589 in6_addr_t mrec_group;
587 590 slist_t mrec_srcs;
588 591 } mrec_t;
589 592
590 593 /* Group membership list per upper conn */
591 594
592 595 /*
593 596 * We record the multicast information from the socket option in
594 597 * ilg_ifaddr/ilg_ifindex. This allows rejoining the group in the case when
595 598 * the ifaddr (or ifindex) disappears and later reappears, potentially on
596 599 * a different ill. The IPv6 multicast socket options and ioctls all specify
597 600 * the interface using an ifindex. For IPv4 some socket options/ioctls use
598 601 * the interface address and others use the index. We record here the method
599 602 * that was actually used (and leave the other of ilg_ifaddr or ilg_ifindex)
600 603 * at zero so that we can rejoin the way the application intended.
601 604 *
602 605 * We track the ill on which we will or already have joined an ilm using
603 606 * ilg_ill. When we have succeeded joining the ilm and have a refhold on it
604 607 * then we set ilg_ilm. Thus intentionally there is a window where ilg_ill is
605 608 * set and ilg_ilm is not set. This allows clearing ilg_ill as a signal that
606 609 * the ill is being unplumbed and the ilm should be discarded.
607 610 *
608 611 * ilg records the state of multicast memberships of a socket end point.
609 612 * ilm records the state of multicast memberships with the driver and is
610 613 * maintained per interface.
611 614 *
612 615 * The ilg state is protected by conn_ilg_lock.
613 616 * The ilg will not be freed until ilg_refcnt drops to zero.
614 617 */
615 618 typedef struct ilg_s {
616 619 struct ilg_s *ilg_next;
617 620 struct ilg_s **ilg_ptpn;
618 621 struct conn_s *ilg_connp; /* Back pointer to get lock */
619 622 in6_addr_t ilg_v6group;
620 623 ipaddr_t ilg_ifaddr; /* For some IPv4 cases */
621 624 uint_t ilg_ifindex; /* IPv6 and some other IPv4 cases */
622 625 struct ill_s *ilg_ill; /* Where ilm is joined. No refhold */
623 626 struct ilm_s *ilg_ilm; /* With ilm_refhold */
624 627 uint_t ilg_refcnt;
625 628 mcast_record_t ilg_fmode; /* MODE_IS_INCLUDE/MODE_IS_EXCLUDE */
626 629 slist_t *ilg_filter;
627 630 boolean_t ilg_condemned; /* Conceptually deleted */
628 631 } ilg_t;
629 632
630 633 /*
631 634 * Multicast address list entry for ill.
632 635 * ilm_ill is used by IPv4 and IPv6
633 636 *
634 637 * The ilm state (and other multicast state on the ill) is protected by
635 638 * ill_mcast_lock. Operations that change state on both an ilg and ilm
636 639 * in addition use ill_mcast_serializer to ensure that we can't have
637 640 * interleaving between e.g., add and delete operations for the same conn_t,
638 641 * group, and ill. The ill_mcast_serializer is also used to ensure that
639 642 * multicast group joins do not occur on an interface that is in the process
640 643 * of joining an IPMP group.
641 644 *
642 645 * The comment below (and for other netstack_t references) refers
643 646 * to the fact that we only do netstack_hold in particular cases,
644 647 * such as the references from open endpoints (ill_t and conn_t's
645 648 * pointers). Internally within IP we rely on IP's ability to cleanup e.g.
646 649 * ire_t's when an ill goes away.
647 650 */
648 651 typedef struct ilm_s {
649 652 in6_addr_t ilm_v6addr;
650 653 int ilm_refcnt;
651 654 uint_t ilm_timer; /* IGMP/MLD query resp timer, in msec */
652 655 struct ilm_s *ilm_next; /* Linked list for each ill */
653 656 uint_t ilm_state; /* state of the membership */
654 657 struct ill_s *ilm_ill; /* Back pointer to ill - ill_ilm_cnt */
655 658 zoneid_t ilm_zoneid;
656 659 int ilm_no_ilg_cnt; /* number of joins w/ no ilg */
657 660 mcast_record_t ilm_fmode; /* MODE_IS_INCLUDE/MODE_IS_EXCLUDE */
658 661 slist_t *ilm_filter; /* source filter list */
659 662 slist_t *ilm_pendsrcs; /* relevant src addrs for pending req */
660 663 rtx_state_t ilm_rtx; /* SCR retransmission state */
661 664 ipaddr_t ilm_ifaddr; /* For IPv4 netstat */
662 665 ip_stack_t *ilm_ipst; /* Does not have a netstack_hold */
663 666 } ilm_t;
664 667
665 668 #define ilm_addr V4_PART_OF_V6(ilm_v6addr)
666 669
667 670 /*
668 671 * Soft reference to an IPsec SA.
669 672 *
670 673 * On relative terms, conn's can be persistent (living as long as the
671 674 * processes which create them), while SA's are ephemeral (dying when
672 675 * they hit their time-based or byte-based lifetimes).
673 676 *
674 677 * We could hold a hard reference to an SA from an ipsec_latch_t,
675 678 * but this would cause expired SA's to linger for a potentially
676 679 * unbounded time.
677 680 *
678 681 * Instead, we remember the hash bucket number and bucket generation
679 682 * in addition to the pointer. The bucket generation is incremented on
680 683 * each deletion.
681 684 */
682 685 typedef struct ipsa_ref_s
683 686 {
684 687 struct ipsa_s *ipsr_sa;
685 688 struct isaf_s *ipsr_bucket;
686 689 uint64_t ipsr_gen;
687 690 } ipsa_ref_t;
688 691
689 692 /*
690 693 * IPsec "latching" state.
691 694 *
692 695 * In the presence of IPsec policy, fully-bound conn's bind a connection
693 696 * to more than just the 5-tuple, but also a specific IPsec action and
694 697 * identity-pair.
695 698 * The identity pair is accessed from both the receive and transmit side
696 699 * hence it is maintained in the ipsec_latch_t structure. conn_latch and
697 700 * ixa_ipsec_latch points to it.
698 701 * The policy and actions are stored in conn_latch_in_policy and
699 702 * conn_latch_in_action for the inbound side, and in ixa_ipsec_policy and
700 703 * ixa_ipsec_action for the transmit side.
701 704 *
702 705 * As an optimization, we also cache soft references to IPsec SA's in
703 706 * ip_xmit_attr_t so that we can fast-path around most of the work needed for
704 707 * outbound IPsec SA selection.
705 708 */
706 709 typedef struct ipsec_latch_s
707 710 {
708 711 kmutex_t ipl_lock;
709 712 uint32_t ipl_refcnt;
710 713
711 714 struct ipsid_s *ipl_local_cid;
712 715 struct ipsid_s *ipl_remote_cid;
713 716 unsigned int
714 717 ipl_ids_latched : 1,
715 718
716 719 ipl_pad_to_bit_31 : 31;
717 720 } ipsec_latch_t;
718 721
719 722 #define IPLATCH_REFHOLD(ipl) { \
720 723 atomic_add_32(&(ipl)->ipl_refcnt, 1); \
721 724 ASSERT((ipl)->ipl_refcnt != 0); \
722 725 }
723 726
724 727 #define IPLATCH_REFRELE(ipl) { \
725 728 ASSERT((ipl)->ipl_refcnt != 0); \
726 729 membar_exit(); \
727 730 if (atomic_add_32_nv(&(ipl)->ipl_refcnt, -1) == 0) \
728 731 iplatch_free(ipl); \
729 732 }
730 733
731 734 /*
732 735 * peer identity structure.
733 736 */
734 737 typedef struct conn_s conn_t;
735 738
736 739 /*
737 740 * This is used to match an inbound/outbound datagram with policy.
738 741 */
739 742 typedef struct ipsec_selector {
740 743 in6_addr_t ips_local_addr_v6;
741 744 in6_addr_t ips_remote_addr_v6;
742 745 uint16_t ips_local_port;
743 746 uint16_t ips_remote_port;
744 747 uint8_t ips_icmp_type;
745 748 uint8_t ips_icmp_code;
746 749 uint8_t ips_protocol;
747 750 uint8_t ips_isv4 : 1,
748 751 ips_is_icmp_inv_acq: 1;
749 752 } ipsec_selector_t;
750 753
751 754 /*
752 755 * Note that we put v4 addresses in the *first* 32-bit word of the
753 756 * selector rather than the last to simplify the prefix match/mask code
754 757 * in spd.c
755 758 */
756 759 #define ips_local_addr_v4 ips_local_addr_v6.s6_addr32[0]
757 760 #define ips_remote_addr_v4 ips_remote_addr_v6.s6_addr32[0]
758 761
759 762 /* Values used in IP by IPSEC Code */
760 763 #define IPSEC_OUTBOUND B_TRUE
761 764 #define IPSEC_INBOUND B_FALSE
762 765
763 766 /*
764 767 * There are two variants in policy failures. The packet may come in
765 768 * secure when not needed (IPSEC_POLICY_???_NOT_NEEDED) or it may not
766 769 * have the desired level of protection (IPSEC_POLICY_MISMATCH).
767 770 */
768 771 #define IPSEC_POLICY_NOT_NEEDED 0
769 772 #define IPSEC_POLICY_MISMATCH 1
770 773 #define IPSEC_POLICY_AUTH_NOT_NEEDED 2
771 774 #define IPSEC_POLICY_ENCR_NOT_NEEDED 3
772 775 #define IPSEC_POLICY_SE_NOT_NEEDED 4
773 776 #define IPSEC_POLICY_MAX 5 /* Always max + 1. */
774 777
775 778 /*
776 779 * Check with IPSEC inbound policy if
777 780 *
778 781 * 1) per-socket policy is present - indicated by conn_in_enforce_policy.
779 782 * 2) Or if we have not cached policy on the conn and the global policy is
780 783 * non-empty.
781 784 */
782 785 #define CONN_INBOUND_POLICY_PRESENT(connp, ipss) \
783 786 ((connp)->conn_in_enforce_policy || \
784 787 (!((connp)->conn_policy_cached) && \
785 788 (ipss)->ipsec_inbound_v4_policy_present))
786 789
787 790 #define CONN_INBOUND_POLICY_PRESENT_V6(connp, ipss) \
788 791 ((connp)->conn_in_enforce_policy || \
789 792 (!(connp)->conn_policy_cached && \
790 793 (ipss)->ipsec_inbound_v6_policy_present))
791 794
792 795 #define CONN_OUTBOUND_POLICY_PRESENT(connp, ipss) \
793 796 ((connp)->conn_out_enforce_policy || \
794 797 (!((connp)->conn_policy_cached) && \
795 798 (ipss)->ipsec_outbound_v4_policy_present))
796 799
797 800 #define CONN_OUTBOUND_POLICY_PRESENT_V6(connp, ipss) \
798 801 ((connp)->conn_out_enforce_policy || \
799 802 (!(connp)->conn_policy_cached && \
800 803 (ipss)->ipsec_outbound_v6_policy_present))
801 804
802 805 /*
803 806 * Information cached in IRE for upper layer protocol (ULP).
804 807 */
805 808 typedef struct iulp_s {
806 809 boolean_t iulp_set; /* Is any metric set? */
807 810 uint32_t iulp_ssthresh; /* Slow start threshold (TCP). */
808 811 clock_t iulp_rtt; /* Guestimate in millisecs. */
809 812 clock_t iulp_rtt_sd; /* Cached value of RTT variance. */
810 813 uint32_t iulp_spipe; /* Send pipe size. */
811 814 uint32_t iulp_rpipe; /* Receive pipe size. */
812 815 uint32_t iulp_rtomax; /* Max round trip timeout. */
813 816 uint32_t iulp_sack; /* Use SACK option (TCP)? */
814 817 uint32_t iulp_mtu; /* Setable with routing sockets */
815 818
816 819 uint32_t
817 820 iulp_tstamp_ok : 1, /* Use timestamp option (TCP)? */
818 821 iulp_wscale_ok : 1, /* Use window scale option (TCP)? */
819 822 iulp_ecn_ok : 1, /* Enable ECN (for TCP)? */
820 823 iulp_pmtud_ok : 1, /* Enable PMTUd? */
821 824
822 825 /* These three are passed out by ip_set_destination */
823 826 iulp_localnet: 1, /* IRE_ONLINK */
824 827 iulp_loopback: 1, /* IRE_LOOPBACK */
825 828 iulp_local: 1, /* IRE_LOCAL */
826 829
827 830 iulp_not_used : 25;
828 831 } iulp_t;
829 832
830 833 /*
831 834 * The conn drain list structure (idl_t), protected by idl_lock. Each conn_t
832 835 * inserted in the list points back at this idl_t using conn_idl, and is
833 836 * chained by conn_drain_next and conn_drain_prev, which are also protected by
834 837 * idl_lock. When flow control is relieved, either ip_wsrv() (STREAMS) or
835 838 * ill_flow_enable() (non-STREAMS) will call conn_drain().
836 839 *
837 840 * The conn drain list, idl_t, itself is part of tx cookie list structure.
838 841 * A tx cookie list points to a blocked Tx ring and contains the list of
839 842 * all conn's that are blocked due to the flow-controlled Tx ring (via
840 843 * the idl drain list). Note that a link can have multiple Tx rings. The
841 844 * drain list will store the conn's blocked due to Tx ring being flow
842 845 * controlled.
843 846 */
844 847
845 848 typedef uintptr_t ip_mac_tx_cookie_t;
846 849 typedef struct idl_s idl_t;
847 850 typedef struct idl_tx_list_s idl_tx_list_t;
848 851
849 852 struct idl_tx_list_s {
850 853 ip_mac_tx_cookie_t txl_cookie;
851 854 kmutex_t txl_lock; /* Lock for this list */
852 855 idl_t *txl_drain_list;
853 856 int txl_drain_index;
854 857 };
855 858
856 859 struct idl_s {
857 860 conn_t *idl_conn; /* Head of drain list */
858 861 kmutex_t idl_lock; /* Lock for this list */
859 862 idl_tx_list_t *idl_itl;
860 863 };
861 864
862 865 /*
863 866 * Interface route structure which holds the necessary information to recreate
864 867 * routes that are tied to an interface i.e. have ire_ill set.
865 868 *
866 869 * These routes which were initially created via a routing socket or via the
867 870 * SIOCADDRT ioctl may be gateway routes (RTF_GATEWAY being set) or may be
868 871 * traditional interface routes. When an ill comes back up after being
869 872 * down, this information will be used to recreate the routes. These
870 873 * are part of an mblk_t chain that hangs off of the ILL (ill_saved_ire_mp).
871 874 */
872 875 typedef struct ifrt_s {
873 876 ushort_t ifrt_type; /* Type of IRE */
874 877 in6_addr_t ifrt_v6addr; /* Address IRE represents. */
875 878 in6_addr_t ifrt_v6gateway_addr; /* Gateway if IRE_OFFLINK */
876 879 in6_addr_t ifrt_v6setsrc_addr; /* Src addr if RTF_SETSRC */
877 880 in6_addr_t ifrt_v6mask; /* Mask for matching IRE. */
878 881 uint32_t ifrt_flags; /* flags related to route */
879 882 iulp_t ifrt_metrics; /* Routing socket metrics */
880 883 zoneid_t ifrt_zoneid; /* zoneid for route */
881 884 } ifrt_t;
882 885
883 886 #define ifrt_addr V4_PART_OF_V6(ifrt_v6addr)
884 887 #define ifrt_gateway_addr V4_PART_OF_V6(ifrt_v6gateway_addr)
885 888 #define ifrt_mask V4_PART_OF_V6(ifrt_v6mask)
886 889 #define ifrt_setsrc_addr V4_PART_OF_V6(ifrt_v6setsrc_addr)
887 890
888 891 /* Number of IP addresses that can be hosted on a physical interface */
889 892 #define MAX_ADDRS_PER_IF 8192
890 893 /*
891 894 * Number of Source addresses to be considered for source address
892 895 * selection. Used by ipif_select_source_v4/v6.
893 896 */
894 897 #define MAX_IPIF_SELECT_SOURCE 50
895 898
896 899 #ifdef IP_DEBUG
897 900 /*
898 901 * Trace refholds and refreles for debugging.
899 902 */
900 903 #define TR_STACK_DEPTH 14
901 904 typedef struct tr_buf_s {
902 905 int tr_depth;
903 906 clock_t tr_time;
904 907 pc_t tr_stack[TR_STACK_DEPTH];
905 908 } tr_buf_t;
906 909
907 910 typedef struct th_trace_s {
908 911 int th_refcnt;
909 912 uint_t th_trace_lastref;
910 913 kthread_t *th_id;
911 914 #define TR_BUF_MAX 38
912 915 tr_buf_t th_trbuf[TR_BUF_MAX];
913 916 } th_trace_t;
914 917
915 918 typedef struct th_hash_s {
916 919 list_node_t thh_link;
917 920 mod_hash_t *thh_hash;
918 921 ip_stack_t *thh_ipst;
919 922 } th_hash_t;
920 923 #endif
921 924
922 925 /* The following are ipif_state_flags */
923 926 #define IPIF_CONDEMNED 0x1 /* The ipif is being removed */
924 927 #define IPIF_CHANGING 0x2 /* A critcal ipif field is changing */
925 928 #define IPIF_SET_LINKLOCAL 0x10 /* transient flag during bringup */
926 929
927 930 /* IP interface structure, one per local address */
928 931 typedef struct ipif_s {
929 932 struct ipif_s *ipif_next;
930 933 struct ill_s *ipif_ill; /* Back pointer to our ill */
931 934 int ipif_id; /* Logical unit number */
932 935 in6_addr_t ipif_v6lcl_addr; /* Local IP address for this if. */
933 936 in6_addr_t ipif_v6subnet; /* Subnet prefix for this if. */
934 937 in6_addr_t ipif_v6net_mask; /* Net mask for this interface. */
935 938 in6_addr_t ipif_v6brd_addr; /* Broadcast addr for this interface. */
936 939 in6_addr_t ipif_v6pp_dst_addr; /* Point-to-point dest address. */
937 940 uint64_t ipif_flags; /* Interface flags. */
938 941 uint_t ipif_ire_type; /* IRE_LOCAL or IRE_LOOPBACK */
939 942
940 943 /*
941 944 * The packet count in the ipif contain the sum of the
942 945 * packet counts in dead IRE_LOCAL/LOOPBACK for this ipif.
943 946 */
944 947 uint_t ipif_ib_pkt_count; /* Inbound packets for our dead IREs */
945 948
946 949 /* Exclusive bit fields, protected by ipsq_t */
947 950 unsigned int
948 951 ipif_was_up : 1, /* ipif was up before */
949 952 ipif_addr_ready : 1, /* DAD is done */
950 953 ipif_was_dup : 1, /* DAD had failed */
951 954 ipif_added_nce : 1, /* nce added for local address */
952 955
953 956 ipif_pad_to_31 : 28;
954 957
955 958 ilm_t *ipif_allhosts_ilm; /* For all-nodes join */
956 959 ilm_t *ipif_solmulti_ilm; /* For IPv6 solicited multicast join */
957 960
958 961 uint_t ipif_seqid; /* unique index across all ills */
959 962 uint_t ipif_state_flags; /* See IPIF_* flag defs above */
960 963 uint_t ipif_refcnt; /* active consistent reader cnt */
961 964
962 965 zoneid_t ipif_zoneid; /* zone ID number */
963 966 timeout_id_t ipif_recovery_id; /* Timer for DAD recovery */
964 967 boolean_t ipif_trace_disable; /* True when alloc fails */
965 968 /*
966 969 * For an IPMP interface, ipif_bound_ill tracks the ill whose hardware
967 970 * information this ipif is associated with via ARP/NDP. We can use
968 971 * an ill pointer (rather than an index) because only ills that are
969 972 * part of a group will be pointed to, and an ill cannot disappear
970 973 * while it's in a group.
971 974 */
972 975 struct ill_s *ipif_bound_ill;
973 976 struct ipif_s *ipif_bound_next; /* bound ipif chain */
974 977 boolean_t ipif_bound; /* B_TRUE if we successfully bound */
975 978
976 979 struct ire_s *ipif_ire_local; /* Our IRE_LOCAL or LOOPBACK */
977 980 struct ire_s *ipif_ire_if; /* Our IRE_INTERFACE */
978 981 } ipif_t;
979 982
980 983 /*
981 984 * The following table lists the protection levels of the various members
982 985 * of the ipif_t. The following notation is used.
983 986 *
984 987 * Write once - Written to only once at the time of bringing up
985 988 * the interface and can be safely read after the bringup without any lock.
986 989 *
987 990 * ipsq - Need to execute in the ipsq to perform the indicated access.
988 991 *
989 992 * ill_lock - Need to hold this mutex to perform the indicated access.
990 993 *
991 994 * ill_g_lock - Need to hold this rw lock as reader/writer for read access or
992 995 * write access respectively.
993 996 *
994 997 * down ill - Written to only when the ill is down (i.e all ipifs are down)
995 998 * up ill - Read only when the ill is up (i.e. at least 1 ipif is up)
996 999 *
997 1000 * Table of ipif_t members and their protection
998 1001 *
999 1002 * ipif_next ipsq + ill_lock + ipsq OR ill_lock OR
1000 1003 * ill_g_lock ill_g_lock
1001 1004 * ipif_ill ipsq + down ipif write once
1002 1005 * ipif_id ipsq + down ipif write once
1003 1006 * ipif_v6lcl_addr ipsq + down ipif up ipif
1004 1007 * ipif_v6subnet ipsq + down ipif up ipif
1005 1008 * ipif_v6net_mask ipsq + down ipif up ipif
1006 1009 *
1007 1010 * ipif_v6brd_addr
1008 1011 * ipif_v6pp_dst_addr
1009 1012 * ipif_flags ill_lock ill_lock
1010 1013 * ipif_ire_type ipsq + down ill up ill
1011 1014 *
1012 1015 * ipif_ib_pkt_count Approx
1013 1016 *
1014 1017 * bit fields ill_lock ill_lock
1015 1018 *
1016 1019 * ipif_allhosts_ilm ipsq ipsq
1017 1020 * ipif_solmulti_ilm ipsq ipsq
1018 1021 *
1019 1022 * ipif_seqid ipsq Write once
1020 1023 *
1021 1024 * ipif_state_flags ill_lock ill_lock
1022 1025 * ipif_refcnt ill_lock ill_lock
1023 1026 * ipif_bound_ill ipsq + ipmp_lock ipsq OR ipmp_lock
1024 1027 * ipif_bound_next ipsq ipsq
1025 1028 * ipif_bound ipsq ipsq
1026 1029 *
1027 1030 * ipif_ire_local ipsq + ips_ill_g_lock ipsq OR ips_ill_g_lock
1028 1031 * ipif_ire_if ipsq + ips_ill_g_lock ipsq OR ips_ill_g_lock
1029 1032 */
1030 1033
1031 1034 /*
1032 1035 * Return values from ip_laddr_verify_{v4,v6}
1033 1036 */
1034 1037 typedef enum { IPVL_UNICAST_UP, IPVL_UNICAST_DOWN, IPVL_MCAST, IPVL_BCAST,
1035 1038 IPVL_BAD} ip_laddr_t;
1036 1039
1037 1040
1038 1041 #define IP_TR_HASH(tid) ((((uintptr_t)tid) >> 6) & (IP_TR_HASH_MAX - 1))
1039 1042
1040 1043 #ifdef DEBUG
1041 1044 #define IPIF_TRACE_REF(ipif) ipif_trace_ref(ipif)
1042 1045 #define ILL_TRACE_REF(ill) ill_trace_ref(ill)
1043 1046 #define IPIF_UNTRACE_REF(ipif) ipif_untrace_ref(ipif)
1044 1047 #define ILL_UNTRACE_REF(ill) ill_untrace_ref(ill)
1045 1048 #else
1046 1049 #define IPIF_TRACE_REF(ipif)
1047 1050 #define ILL_TRACE_REF(ill)
1048 1051 #define IPIF_UNTRACE_REF(ipif)
1049 1052 #define ILL_UNTRACE_REF(ill)
1050 1053 #endif
1051 1054
1052 1055 /* IPv4 compatibility macros */
1053 1056 #define ipif_lcl_addr V4_PART_OF_V6(ipif_v6lcl_addr)
1054 1057 #define ipif_subnet V4_PART_OF_V6(ipif_v6subnet)
1055 1058 #define ipif_net_mask V4_PART_OF_V6(ipif_v6net_mask)
1056 1059 #define ipif_brd_addr V4_PART_OF_V6(ipif_v6brd_addr)
1057 1060 #define ipif_pp_dst_addr V4_PART_OF_V6(ipif_v6pp_dst_addr)
1058 1061
1059 1062 /* Macros for easy backreferences to the ill. */
1060 1063 #define ipif_isv6 ipif_ill->ill_isv6
1061 1064
1062 1065 #define SIOCLIFADDR_NDX 112 /* ndx of SIOCLIFADDR in the ndx ioctl table */
1063 1066
1064 1067 /*
1065 1068 * mode value for ip_ioctl_finish for finishing an ioctl
1066 1069 */
1067 1070 #define CONN_CLOSE 1 /* No mi_copy */
1068 1071 #define COPYOUT 2 /* do an mi_copyout if needed */
1069 1072 #define NO_COPYOUT 3 /* do an mi_copy_done */
1070 1073 #define IPI2MODE(ipi) ((ipi)->ipi_flags & IPI_GET_CMD ? COPYOUT : NO_COPYOUT)
1071 1074
1072 1075 /*
1073 1076 * The IP-MT design revolves around the serialization objects ipsq_t (IPSQ)
1074 1077 * and ipxop_t (exclusive operation or "xop"). Becoming "writer" on an IPSQ
1075 1078 * ensures that no other threads can become "writer" on any IPSQs sharing that
1076 1079 * IPSQ's xop until the writer thread is done.
1077 1080 *
1078 1081 * Each phyint points to one IPSQ that remains fixed over the phyint's life.
1079 1082 * Each IPSQ points to one xop that can change over the IPSQ's life. If a
1080 1083 * phyint is *not* in an IPMP group, then its IPSQ will refer to the IPSQ's
1081 1084 * "own" xop (ipsq_ownxop). If a phyint *is* part of an IPMP group, then its
1082 1085 * IPSQ will refer to the "group" xop, which is shorthand for the xop of the
1083 1086 * IPSQ of the IPMP meta-interface's phyint. Thus, all phyints that are part
1084 1087 * of the same IPMP group will have their IPSQ's point to the group xop, and
1085 1088 * thus becoming "writer" on any phyint in the group will prevent any other
1086 1089 * writer on any other phyint in the group. All IPSQs sharing the same xop
1087 1090 * are chained together through ipsq_next (in the degenerate common case,
1088 1091 * ipsq_next simply refers to itself). Note that the group xop is guaranteed
1089 1092 * to exist at least as long as there are members in the group, since the IPMP
1090 1093 * meta-interface can only be destroyed if the group is empty.
1091 1094 *
1092 1095 * Incoming exclusive operation requests are enqueued on the IPSQ they arrived
1093 1096 * on rather than the xop. This makes switching xop's (as would happen when a
1094 1097 * phyint leaves an IPMP group) simple, because after the phyint leaves the
1095 1098 * group, any operations enqueued on its IPSQ can be safely processed with
1096 1099 * respect to its new xop, and any operations enqueued on the IPSQs of its
1097 1100 * former group can be processed with respect to their existing group xop.
1098 1101 * Even so, switching xops is a subtle dance; see ipsq_dq() for details.
1099 1102 *
1100 1103 * An IPSQ's "own" xop is embedded within the IPSQ itself since they have have
1101 1104 * identical lifetimes, and because doing so simplifies pointer management.
1102 1105 * While each phyint and IPSQ point to each other, it is not possible to free
1103 1106 * the IPSQ when the phyint is freed, since we may still *inside* the IPSQ
1104 1107 * when the phyint is being freed. Thus, ipsq_phyint is set to NULL when the
1105 1108 * phyint is freed, and the IPSQ free is later done in ipsq_exit().
1106 1109 *
1107 1110 * ipsq_t synchronization: read write
1108 1111 *
1109 1112 * ipsq_xopq_mphead ipx_lock ipx_lock
1110 1113 * ipsq_xopq_mptail ipx_lock ipx_lock
1111 1114 * ipsq_xop_switch_mp ipsq_lock ipsq_lock
1112 1115 * ipsq_phyint write once write once
1113 1116 * ipsq_next RW_READER ill_g_lock RW_WRITER ill_g_lock
1114 1117 * ipsq_xop ipsq_lock or ipsq ipsq_lock + ipsq
1115 1118 * ipsq_swxop ipsq ipsq
1116 1119 * ipsq_ownxop see ipxop_t see ipxop_t
1117 1120 * ipsq_ipst write once write once
1118 1121 *
1119 1122 * ipxop_t synchronization: read write
1120 1123 *
1121 1124 * ipx_writer ipx_lock ipx_lock
1122 1125 * ipx_xop_queued ipx_lock ipx_lock
1123 1126 * ipx_mphead ipx_lock ipx_lock
1124 1127 * ipx_mptail ipx_lock ipx_lock
1125 1128 * ipx_ipsq write once write once
1126 1129 * ips_ipsq_queued ipx_lock ipx_lock
1127 1130 * ipx_waitfor ipsq or ipx_lock ipsq + ipx_lock
1128 1131 * ipx_reentry_cnt ipsq or ipx_lock ipsq + ipx_lock
1129 1132 * ipx_current_done ipsq ipsq
1130 1133 * ipx_current_ioctl ipsq ipsq
1131 1134 * ipx_current_ipif ipsq or ipx_lock ipsq + ipx_lock
1132 1135 * ipx_pending_ipif ipsq or ipx_lock ipsq + ipx_lock
1133 1136 * ipx_pending_mp ipsq or ipx_lock ipsq + ipx_lock
1134 1137 * ipx_forced ipsq ipsq
1135 1138 * ipx_depth ipsq ipsq
1136 1139 * ipx_stack ipsq ipsq
1137 1140 */
1138 1141 typedef struct ipxop_s {
1139 1142 kmutex_t ipx_lock; /* see above */
1140 1143 kthread_t *ipx_writer; /* current owner */
1141 1144 mblk_t *ipx_mphead; /* messages tied to this op */
1142 1145 mblk_t *ipx_mptail;
1143 1146 struct ipsq_s *ipx_ipsq; /* associated ipsq */
1144 1147 boolean_t ipx_ipsq_queued; /* ipsq using xop has queued op */
1145 1148 int ipx_waitfor; /* waiting; values encoded below */
1146 1149 int ipx_reentry_cnt;
1147 1150 boolean_t ipx_current_done; /* is the current operation done? */
1148 1151 int ipx_current_ioctl; /* current ioctl, or 0 if no ioctl */
1149 1152 ipif_t *ipx_current_ipif; /* ipif for current op */
1150 1153 ipif_t *ipx_pending_ipif; /* ipif for ipx_pending_mp */
1151 1154 mblk_t *ipx_pending_mp; /* current ioctl mp while waiting */
1152 1155 boolean_t ipx_forced; /* debugging aid */
1153 1156 #ifdef DEBUG
1154 1157 int ipx_depth; /* debugging aid */
1155 1158 #define IPX_STACK_DEPTH 15
1156 1159 pc_t ipx_stack[IPX_STACK_DEPTH]; /* debugging aid */
1157 1160 #endif
1158 1161 } ipxop_t;
1159 1162
1160 1163 typedef struct ipsq_s {
1161 1164 kmutex_t ipsq_lock; /* see above */
1162 1165 mblk_t *ipsq_switch_mp; /* op to handle right after switch */
1163 1166 mblk_t *ipsq_xopq_mphead; /* list of excl ops (mostly ioctls) */
1164 1167 mblk_t *ipsq_xopq_mptail;
1165 1168 struct phyint *ipsq_phyint; /* associated phyint */
1166 1169 struct ipsq_s *ipsq_next; /* next ipsq sharing ipsq_xop */
1167 1170 struct ipxop_s *ipsq_xop; /* current xop synchronization info */
1168 1171 struct ipxop_s *ipsq_swxop; /* switch xop to on ipsq_exit() */
1169 1172 struct ipxop_s ipsq_ownxop; /* our own xop (may not be in-use) */
1170 1173 ip_stack_t *ipsq_ipst; /* does not have a netstack_hold */
1171 1174 } ipsq_t;
1172 1175
1173 1176 /*
1174 1177 * ipx_waitfor values:
1175 1178 */
1176 1179 enum {
1177 1180 IPIF_DOWN = 1, /* ipif_down() waiting for refcnts to drop */
1178 1181 ILL_DOWN, /* ill_down() waiting for refcnts to drop */
1179 1182 IPIF_FREE, /* ipif_free() waiting for refcnts to drop */
1180 1183 ILL_FREE /* ill unplumb waiting for refcnts to drop */
1181 1184 };
1182 1185
1183 1186 /* Operation types for ipsq_try_enter() */
1184 1187 #define CUR_OP 0 /* request writer within current operation */
1185 1188 #define NEW_OP 1 /* request writer for a new operation */
1186 1189 #define SWITCH_OP 2 /* request writer once IPSQ XOP switches */
1187 1190
1188 1191 /*
1189 1192 * Kstats tracked on each IPMP meta-interface. Order here must match
1190 1193 * ipmp_kstats[] in ip/ipmp.c.
1191 1194 */
1192 1195 enum {
1193 1196 IPMP_KSTAT_OBYTES, IPMP_KSTAT_OBYTES64, IPMP_KSTAT_RBYTES,
1194 1197 IPMP_KSTAT_RBYTES64, IPMP_KSTAT_OPACKETS, IPMP_KSTAT_OPACKETS64,
1195 1198 IPMP_KSTAT_OERRORS, IPMP_KSTAT_IPACKETS, IPMP_KSTAT_IPACKETS64,
1196 1199 IPMP_KSTAT_IERRORS, IPMP_KSTAT_MULTIRCV, IPMP_KSTAT_MULTIXMT,
1197 1200 IPMP_KSTAT_BRDCSTRCV, IPMP_KSTAT_BRDCSTXMT, IPMP_KSTAT_LINK_UP,
1198 1201 IPMP_KSTAT_MAX /* keep last */
1199 1202 };
1200 1203
1201 1204 /*
1202 1205 * phyint represents state that is common to both IPv4 and IPv6 interfaces.
1203 1206 * There is a separate ill_t representing IPv4 and IPv6 which has a
1204 1207 * backpointer to the phyint structure for accessing common state.
1205 1208 */
1206 1209 typedef struct phyint {
1207 1210 struct ill_s *phyint_illv4;
1208 1211 struct ill_s *phyint_illv6;
1209 1212 uint_t phyint_ifindex; /* SIOCSLIFINDEX */
1210 1213 uint64_t phyint_flags;
1211 1214 avl_node_t phyint_avl_by_index; /* avl tree by index */
1212 1215 avl_node_t phyint_avl_by_name; /* avl tree by name */
1213 1216 kmutex_t phyint_lock;
1214 1217 struct ipsq_s *phyint_ipsq; /* back pointer to ipsq */
1215 1218 struct ipmp_grp_s *phyint_grp; /* associated IPMP group */
1216 1219 char phyint_name[LIFNAMSIZ]; /* physical interface name */
1217 1220 uint64_t phyint_kstats0[IPMP_KSTAT_MAX]; /* baseline kstats */
1218 1221 } phyint_t;
1219 1222
1220 1223 #define CACHE_ALIGN_SIZE 64
1221 1224 #define CACHE_ALIGN(align_struct) P2ROUNDUP(sizeof (struct align_struct),\
1222 1225 CACHE_ALIGN_SIZE)
1223 1226 struct _phyint_list_s_ {
1224 1227 avl_tree_t phyint_list_avl_by_index; /* avl tree by index */
1225 1228 avl_tree_t phyint_list_avl_by_name; /* avl tree by name */
1226 1229 };
1227 1230
1228 1231 typedef union phyint_list_u {
1229 1232 struct _phyint_list_s_ phyint_list_s;
1230 1233 char phyint_list_filler[CACHE_ALIGN(_phyint_list_s_)];
1231 1234 } phyint_list_t;
1232 1235
1233 1236 #define phyint_list_avl_by_index phyint_list_s.phyint_list_avl_by_index
1234 1237 #define phyint_list_avl_by_name phyint_list_s.phyint_list_avl_by_name
1235 1238
1236 1239 /*
1237 1240 * Fragmentation hash bucket
1238 1241 */
1239 1242 typedef struct ipfb_s {
1240 1243 struct ipf_s *ipfb_ipf; /* List of ... */
1241 1244 size_t ipfb_count; /* Count of bytes used by frag(s) */
1242 1245 kmutex_t ipfb_lock; /* Protect all ipf in list */
1243 1246 uint_t ipfb_frag_pkts; /* num of distinct fragmented pkts */
1244 1247 } ipfb_t;
1245 1248
1246 1249 /*
1247 1250 * IRE bucket structure. Usually there is an array of such structures,
1248 1251 * each pointing to a linked list of ires. irb_refcnt counts the number
1249 1252 * of walkers of a given hash bucket. Usually the reference count is
1250 1253 * bumped up if the walker wants no IRES to be DELETED while walking the
1251 1254 * list. Bumping up does not PREVENT ADDITION. This allows walking a given
1252 1255 * hash bucket without stumbling up on a free pointer.
1253 1256 *
1254 1257 * irb_t structures in ip_ftable are dynamically allocated and freed.
1255 1258 * In order to identify the irb_t structures that can be safely kmem_free'd
1256 1259 * we need to ensure that
1257 1260 * - the irb_refcnt is quiescent, indicating no other walkers,
1258 1261 * - no other threads or ire's are holding references to the irb,
1259 1262 * i.e., irb_nire == 0,
1260 1263 * - there are no active ire's in the bucket, i.e., irb_ire_cnt == 0
1261 1264 */
1262 1265 typedef struct irb {
1263 1266 struct ire_s *irb_ire; /* First ire in this bucket */
1264 1267 /* Should be first in this struct */
1265 1268 krwlock_t irb_lock; /* Protect this bucket */
1266 1269 uint_t irb_refcnt; /* Protected by irb_lock */
1267 1270 uchar_t irb_marks; /* CONDEMNED ires in this bucket ? */
1268 1271 #define IRB_MARK_CONDEMNED 0x0001 /* Contains some IRE_IS_CONDEMNED */
1269 1272 #define IRB_MARK_DYNAMIC 0x0002 /* Dynamically allocated */
1270 1273 /* Once IPv6 uses radix then IRB_MARK_DYNAMIC will be always be set */
1271 1274 uint_t irb_ire_cnt; /* Num of active IRE in this bucket */
1272 1275 int irb_nire; /* Num of ftable ire's that ref irb */
1273 1276 ip_stack_t *irb_ipst; /* Does not have a netstack_hold */
1274 1277 } irb_t;
1275 1278
1276 1279 /*
1277 1280 * This is the structure used to store the multicast physical addresses
1278 1281 * that an interface has joined.
1279 1282 * The refcnt keeps track of the number of multicast IP addresses mapping
1280 1283 * to a physical multicast address.
1281 1284 */
1282 1285 typedef struct multiphysaddr_s {
1283 1286 struct multiphysaddr_s *mpa_next;
1284 1287 char mpa_addr[IP_MAX_HW_LEN];
1285 1288 int mpa_refcnt;
1286 1289 } multiphysaddr_t;
1287 1290
1288 1291 #define IRB2RT(irb) (rt_t *)((caddr_t)(irb) - offsetof(rt_t, rt_irb))
1289 1292
1290 1293 /* Forward declarations */
1291 1294 struct dce_s;
1292 1295 typedef struct dce_s dce_t;
1293 1296 struct ire_s;
1294 1297 typedef struct ire_s ire_t;
1295 1298 struct ncec_s;
1296 1299 typedef struct ncec_s ncec_t;
1297 1300 struct nce_s;
1298 1301 typedef struct nce_s nce_t;
1299 1302 struct ip_recv_attr_s;
1300 1303 typedef struct ip_recv_attr_s ip_recv_attr_t;
1301 1304 struct ip_xmit_attr_s;
1302 1305 typedef struct ip_xmit_attr_s ip_xmit_attr_t;
1303 1306
1304 1307 struct tsol_ire_gw_secattr_s;
1305 1308 typedef struct tsol_ire_gw_secattr_s tsol_ire_gw_secattr_t;
1306 1309
1307 1310 /*
1308 1311 * This is a structure for a one-element route cache that is passed
1309 1312 * by reference between ip_input and ill_inputfn.
1310 1313 */
1311 1314 typedef struct {
1312 1315 ire_t *rtc_ire;
1313 1316 ipaddr_t rtc_ipaddr;
1314 1317 in6_addr_t rtc_ip6addr;
1315 1318 } rtc_t;
1316 1319
1317 1320 /*
1318 1321 * Note: Temporarily use 64 bits, and will probably go back to 32 bits after
1319 1322 * more cleanup work is done.
1320 1323 */
1321 1324 typedef uint64_t iaflags_t;
1322 1325
1323 1326 /* The ill input function pointer type */
1324 1327 typedef void (*pfillinput_t)(mblk_t *, void *, void *, ip_recv_attr_t *,
1325 1328 rtc_t *);
1326 1329
1327 1330 /* The ire receive function pointer type */
1328 1331 typedef void (*pfirerecv_t)(ire_t *, mblk_t *, void *, ip_recv_attr_t *);
1329 1332
1330 1333 /* The ire send and postfrag function pointer types */
1331 1334 typedef int (*pfiresend_t)(ire_t *, mblk_t *, void *,
1332 1335 ip_xmit_attr_t *, uint32_t *);
1333 1336 typedef int (*pfirepostfrag_t)(mblk_t *, nce_t *, iaflags_t, uint_t, uint32_t,
1334 1337 zoneid_t, zoneid_t, uintptr_t *);
1335 1338
1336 1339
1337 1340 #define IP_V4_G_HEAD 0
1338 1341 #define IP_V6_G_HEAD 1
1339 1342
1340 1343 #define MAX_G_HEADS 2
1341 1344
1342 1345 /*
1343 1346 * unpadded ill_if structure
1344 1347 */
1345 1348 struct _ill_if_s_ {
1346 1349 union ill_if_u *illif_next;
1347 1350 union ill_if_u *illif_prev;
1348 1351 avl_tree_t illif_avl_by_ppa; /* AVL tree sorted on ppa */
1349 1352 vmem_t *illif_ppa_arena; /* ppa index space */
1350 1353 uint16_t illif_mcast_v1; /* hints for */
1351 1354 uint16_t illif_mcast_v2; /* [igmp|mld]_slowtimo */
1352 1355 int illif_name_len; /* name length */
1353 1356 char illif_name[LIFNAMSIZ]; /* name of interface type */
1354 1357 };
1355 1358
1356 1359 /* cache aligned ill_if structure */
1357 1360 typedef union ill_if_u {
1358 1361 struct _ill_if_s_ ill_if_s;
1359 1362 char illif_filler[CACHE_ALIGN(_ill_if_s_)];
1360 1363 } ill_if_t;
1361 1364
1362 1365 #define illif_next ill_if_s.illif_next
1363 1366 #define illif_prev ill_if_s.illif_prev
1364 1367 #define illif_avl_by_ppa ill_if_s.illif_avl_by_ppa
1365 1368 #define illif_ppa_arena ill_if_s.illif_ppa_arena
1366 1369 #define illif_mcast_v1 ill_if_s.illif_mcast_v1
1367 1370 #define illif_mcast_v2 ill_if_s.illif_mcast_v2
1368 1371 #define illif_name ill_if_s.illif_name
1369 1372 #define illif_name_len ill_if_s.illif_name_len
1370 1373
1371 1374 typedef struct ill_walk_context_s {
1372 1375 int ctx_current_list; /* current list being searched */
1373 1376 int ctx_last_list; /* last list to search */
1374 1377 } ill_walk_context_t;
1375 1378
1376 1379 /*
1377 1380 * ill_g_heads structure, one for IPV4 and one for IPV6
1378 1381 */
1379 1382 struct _ill_g_head_s_ {
1380 1383 ill_if_t *ill_g_list_head;
1381 1384 ill_if_t *ill_g_list_tail;
1382 1385 };
1383 1386
1384 1387 typedef union ill_g_head_u {
1385 1388 struct _ill_g_head_s_ ill_g_head_s;
1386 1389 char ill_g_head_filler[CACHE_ALIGN(_ill_g_head_s_)];
1387 1390 } ill_g_head_t;
1388 1391
1389 1392 #define ill_g_list_head ill_g_head_s.ill_g_list_head
1390 1393 #define ill_g_list_tail ill_g_head_s.ill_g_list_tail
1391 1394
1392 1395 #define IP_V4_ILL_G_LIST(ipst) \
1393 1396 (ipst)->ips_ill_g_heads[IP_V4_G_HEAD].ill_g_list_head
1394 1397 #define IP_V6_ILL_G_LIST(ipst) \
1395 1398 (ipst)->ips_ill_g_heads[IP_V6_G_HEAD].ill_g_list_head
1396 1399 #define IP_VX_ILL_G_LIST(i, ipst) \
1397 1400 (ipst)->ips_ill_g_heads[i].ill_g_list_head
1398 1401
1399 1402 #define ILL_START_WALK_V4(ctx_ptr, ipst) \
1400 1403 ill_first(IP_V4_G_HEAD, IP_V4_G_HEAD, ctx_ptr, ipst)
1401 1404 #define ILL_START_WALK_V6(ctx_ptr, ipst) \
1402 1405 ill_first(IP_V6_G_HEAD, IP_V6_G_HEAD, ctx_ptr, ipst)
1403 1406 #define ILL_START_WALK_ALL(ctx_ptr, ipst) \
1404 1407 ill_first(MAX_G_HEADS, MAX_G_HEADS, ctx_ptr, ipst)
1405 1408
1406 1409 /*
1407 1410 * Capabilities, possible flags for ill_capabilities.
1408 1411 */
1409 1412 #define ILL_CAPAB_LSO 0x04 /* Large Send Offload */
1410 1413 #define ILL_CAPAB_HCKSUM 0x08 /* Hardware checksumming */
1411 1414 #define ILL_CAPAB_ZEROCOPY 0x10 /* Zero-copy */
1412 1415 #define ILL_CAPAB_DLD 0x20 /* DLD capabilities */
1413 1416 #define ILL_CAPAB_DLD_POLL 0x40 /* Polling */
1414 1417 #define ILL_CAPAB_DLD_DIRECT 0x80 /* Direct function call */
1415 1418
1416 1419 /*
1417 1420 * Per-ill Hardware Checksumming capbilities.
1418 1421 */
1419 1422 typedef struct ill_hcksum_capab_s ill_hcksum_capab_t;
1420 1423
1421 1424 /*
1422 1425 * Per-ill Zero-copy capabilities.
1423 1426 */
1424 1427 typedef struct ill_zerocopy_capab_s ill_zerocopy_capab_t;
1425 1428
1426 1429 /*
1427 1430 * DLD capbilities.
1428 1431 */
1429 1432 typedef struct ill_dld_capab_s ill_dld_capab_t;
1430 1433
1431 1434 /*
1432 1435 * Per-ill polling resource map.
1433 1436 */
1434 1437 typedef struct ill_rx_ring ill_rx_ring_t;
1435 1438
1436 1439 /*
1437 1440 * Per-ill Large Send Offload capabilities.
1438 1441 */
1439 1442 typedef struct ill_lso_capab_s ill_lso_capab_t;
1440 1443
1441 1444 /* The following are ill_state_flags */
1442 1445 #define ILL_LL_SUBNET_PENDING 0x01 /* Waiting for DL_INFO_ACK from drv */
1443 1446 #define ILL_CONDEMNED 0x02 /* No more new ref's to the ILL */
1444 1447 #define ILL_DL_UNBIND_IN_PROGRESS 0x04 /* UNBIND_REQ is sent */
1445 1448 /*
1446 1449 * ILL_DOWN_IN_PROGRESS is set to ensure the following:
1447 1450 * - no packets are sent to the driver after the DL_UNBIND_REQ is sent,
1448 1451 * - no longstanding references will be acquired on objects that are being
1449 1452 * brought down.
1450 1453 */
1451 1454 #define ILL_DOWN_IN_PROGRESS 0x08
1452 1455
1453 1456 /* Is this an ILL whose source address is used by other ILL's ? */
1454 1457 #define IS_USESRC_ILL(ill) \
1455 1458 (((ill)->ill_usesrc_ifindex == 0) && \
1456 1459 ((ill)->ill_usesrc_grp_next != NULL))
1457 1460
1458 1461 /* Is this a client/consumer of the usesrc ILL ? */
1459 1462 #define IS_USESRC_CLI_ILL(ill) \
1460 1463 (((ill)->ill_usesrc_ifindex != 0) && \
1461 1464 ((ill)->ill_usesrc_grp_next != NULL))
1462 1465
1463 1466 /* Is this an virtual network interface (vni) ILL ? */
1464 1467 #define IS_VNI(ill) \
1465 1468 (((ill)->ill_phyint->phyint_flags & (PHYI_LOOPBACK|PHYI_VIRTUAL)) == \
1466 1469 PHYI_VIRTUAL)
1467 1470
1468 1471 /* Is this a loopback ILL? */
1469 1472 #define IS_LOOPBACK(ill) \
1470 1473 ((ill)->ill_phyint->phyint_flags & PHYI_LOOPBACK)
1471 1474
1472 1475 /* Is this an IPMP meta-interface ILL? */
1473 1476 #define IS_IPMP(ill) \
1474 1477 ((ill)->ill_phyint->phyint_flags & PHYI_IPMP)
1475 1478
1476 1479 /* Is this ILL under an IPMP meta-interface? (aka "in a group?") */
1477 1480 #define IS_UNDER_IPMP(ill) \
1478 1481 ((ill)->ill_grp != NULL && !IS_IPMP(ill))
1479 1482
1480 1483 /* Is ill1 in the same illgrp as ill2? */
1481 1484 #define IS_IN_SAME_ILLGRP(ill1, ill2) \
1482 1485 ((ill1)->ill_grp != NULL && ((ill1)->ill_grp == (ill2)->ill_grp))
1483 1486
1484 1487 /* Is ill1 on the same LAN as ill2? */
1485 1488 #define IS_ON_SAME_LAN(ill1, ill2) \
1486 1489 ((ill1) == (ill2) || IS_IN_SAME_ILLGRP(ill1, ill2))
1487 1490
1488 1491 #define ILL_OTHER(ill) \
1489 1492 ((ill)->ill_isv6 ? (ill)->ill_phyint->phyint_illv4 : \
1490 1493 (ill)->ill_phyint->phyint_illv6)
1491 1494
1492 1495 /*
1493 1496 * IPMP group ILL state structure -- up to two per IPMP group (V4 and V6).
1494 1497 * Created when the V4 and/or V6 IPMP meta-interface is I_PLINK'd. It is
1495 1498 * guaranteed to persist while there are interfaces of that type in the group.
1496 1499 * In general, most fields are accessed outside of the IPSQ (e.g., in the
1497 1500 * datapath), and thus use locks in addition to the IPSQ for protection.
1498 1501 *
1499 1502 * synchronization: read write
1500 1503 *
1501 1504 * ig_if ipsq or ill_g_lock ipsq and ill_g_lock
1502 1505 * ig_actif ipsq or ipmp_lock ipsq and ipmp_lock
1503 1506 * ig_nactif ipsq or ipmp_lock ipsq and ipmp_lock
1504 1507 * ig_next_ill ipsq or ipmp_lock ipsq and ipmp_lock
1505 1508 * ig_ipmp_ill write once write once
1506 1509 * ig_cast_ill ipsq or ipmp_lock ipsq and ipmp_lock
1507 1510 * ig_arpent ipsq ipsq
1508 1511 * ig_mtu ipsq ipsq
1509 1512 * ig_mc_mtu ipsq ipsq
1510 1513 */
1511 1514 typedef struct ipmp_illgrp_s {
1512 1515 list_t ig_if; /* list of all interfaces */
1513 1516 list_t ig_actif; /* list of active interfaces */
1514 1517 uint_t ig_nactif; /* number of active interfaces */
1515 1518 struct ill_s *ig_next_ill; /* next active interface to use */
1516 1519 struct ill_s *ig_ipmp_ill; /* backpointer to IPMP meta-interface */
1517 1520 struct ill_s *ig_cast_ill; /* nominated ill for multi/broadcast */
1518 1521 list_t ig_arpent; /* list of ARP entries */
1519 1522 uint_t ig_mtu; /* ig_ipmp_ill->ill_mtu */
1520 1523 uint_t ig_mc_mtu; /* ig_ipmp_ill->ill_mc_mtu */
1521 1524 } ipmp_illgrp_t;
1522 1525
1523 1526 /*
1524 1527 * IPMP group state structure -- one per IPMP group. Created when the
1525 1528 * IPMP meta-interface is plumbed; it is guaranteed to persist while there
1526 1529 * are interfaces in it.
1527 1530 *
1528 1531 * ipmp_grp_t synchronization: read write
1529 1532 *
1530 1533 * gr_name ipmp_lock ipmp_lock
1531 1534 * gr_ifname write once write once
1532 1535 * gr_mactype ipmp_lock ipmp_lock
1533 1536 * gr_phyint write once write once
1534 1537 * gr_nif ipmp_lock ipmp_lock
1535 1538 * gr_nactif ipsq ipsq
1536 1539 * gr_v4 ipmp_lock ipmp_lock
1537 1540 * gr_v6 ipmp_lock ipmp_lock
1538 1541 * gr_nv4 ipmp_lock ipmp_lock
1539 1542 * gr_nv6 ipmp_lock ipmp_lock
1540 1543 * gr_pendv4 ipmp_lock ipmp_lock
1541 1544 * gr_pendv6 ipmp_lock ipmp_lock
1542 1545 * gr_linkdownmp ipsq ipsq
1543 1546 * gr_ksp ipmp_lock ipmp_lock
1544 1547 * gr_kstats0 atomic atomic
1545 1548 */
1546 1549 typedef struct ipmp_grp_s {
1547 1550 char gr_name[LIFGRNAMSIZ]; /* group name */
1548 1551 char gr_ifname[LIFNAMSIZ]; /* interface name */
1549 1552 t_uscalar_t gr_mactype; /* DLPI mactype of group */
1550 1553 phyint_t *gr_phyint; /* IPMP group phyint */
1551 1554 uint_t gr_nif; /* number of interfaces in group */
1552 1555 uint_t gr_nactif; /* number of active interfaces */
1553 1556 ipmp_illgrp_t *gr_v4; /* V4 group information */
1554 1557 ipmp_illgrp_t *gr_v6; /* V6 group information */
1555 1558 uint_t gr_nv4; /* number of ills in V4 group */
1556 1559 uint_t gr_nv6; /* number of ills in V6 group */
1557 1560 uint_t gr_pendv4; /* number of pending ills in V4 group */
1558 1561 uint_t gr_pendv6; /* number of pending ills in V6 group */
1559 1562 mblk_t *gr_linkdownmp; /* message used to bring link down */
1560 1563 kstat_t *gr_ksp; /* group kstat pointer */
1561 1564 uint64_t gr_kstats0[IPMP_KSTAT_MAX]; /* baseline group kstats */
1562 1565 } ipmp_grp_t;
1563 1566
1564 1567 /*
1565 1568 * IPMP ARP entry -- one per SIOCS*ARP entry tied to the group. Used to keep
1566 1569 * ARP up-to-date as the active set of interfaces in the group changes.
1567 1570 */
1568 1571 typedef struct ipmp_arpent_s {
1569 1572 ipaddr_t ia_ipaddr; /* IP address for this entry */
1570 1573 boolean_t ia_proxyarp; /* proxy ARP entry? */
1571 1574 boolean_t ia_notified; /* ARP notified about this entry? */
1572 1575 list_node_t ia_node; /* next ARP entry in list */
1573 1576 uint16_t ia_flags; /* nce_flags for the address */
1574 1577 size_t ia_lladdr_len;
1575 1578 uchar_t *ia_lladdr;
1576 1579 } ipmp_arpent_t;
1577 1580
1578 1581 struct arl_s;
1579 1582
1580 1583 /*
1581 1584 * Per-ill capabilities.
1582 1585 */
1583 1586 struct ill_hcksum_capab_s {
1584 1587 uint_t ill_hcksum_version; /* interface version */
1585 1588 uint_t ill_hcksum_txflags; /* capabilities on transmit */
1586 1589 };
1587 1590
1588 1591 struct ill_zerocopy_capab_s {
1589 1592 uint_t ill_zerocopy_version; /* interface version */
1590 1593 uint_t ill_zerocopy_flags; /* capabilities */
1591 1594 };
1592 1595
1593 1596 struct ill_lso_capab_s {
1594 1597 uint_t ill_lso_flags; /* capabilities */
1595 1598 uint_t ill_lso_max; /* maximum size of payload */
1596 1599 };
1597 1600
1598 1601 /*
1599 1602 * IP Lower level Structure.
1600 1603 * Instance data structure in ip_open when there is a device below us.
1601 1604 */
1602 1605 typedef struct ill_s {
1603 1606 pfillinput_t ill_inputfn; /* Fast input function selector */
1604 1607 ill_if_t *ill_ifptr; /* pointer to interface type */
1605 1608 queue_t *ill_rq; /* Read queue. */
1606 1609 queue_t *ill_wq; /* Write queue. */
1607 1610
1608 1611 int ill_error; /* Error value sent up by device. */
1609 1612
1610 1613 ipif_t *ill_ipif; /* Interface chain for this ILL. */
1611 1614
1612 1615 uint_t ill_ipif_up_count; /* Number of IPIFs currently up. */
1613 1616 uint_t ill_max_frag; /* Max IDU from DLPI. */
1614 1617 uint_t ill_current_frag; /* Current IDU from DLPI. */
1615 1618 uint_t ill_mtu; /* User-specified MTU; SIOCSLIFMTU */
1616 1619 uint_t ill_mc_mtu; /* MTU for multi/broadcast */
1617 1620 uint_t ill_metric; /* BSD if metric, for compatibility. */
1618 1621 char *ill_name; /* Our name. */
1619 1622 uint_t ill_ipif_dup_count; /* Number of duplicate addresses. */
1620 1623 uint_t ill_name_length; /* Name length, incl. terminator. */
1621 1624 uint_t ill_net_type; /* IRE_IF_RESOLVER/IRE_IF_NORESOLVER. */
1622 1625 /*
1623 1626 * Physical Point of Attachment num. If DLPI style 1 provider
1624 1627 * then this is derived from the devname.
1625 1628 */
1626 1629 uint_t ill_ppa;
1627 1630 t_uscalar_t ill_sap;
1628 1631 t_scalar_t ill_sap_length; /* Including sign (for position) */
1629 1632 uint_t ill_phys_addr_length; /* Excluding the sap. */
1630 1633 uint_t ill_bcast_addr_length; /* Only set when the DL provider */
1631 1634 /* supports broadcast. */
1632 1635 t_uscalar_t ill_mactype;
1633 1636 uint8_t *ill_frag_ptr; /* Reassembly state. */
1634 1637 timeout_id_t ill_frag_timer_id; /* timeout id for the frag timer */
1635 1638 ipfb_t *ill_frag_hash_tbl; /* Fragment hash list head. */
1636 1639
1637 1640 krwlock_t ill_mcast_lock; /* Protects multicast state */
1638 1641 kmutex_t ill_mcast_serializer; /* Serialize across ilg and ilm state */
1639 1642 ilm_t *ill_ilm; /* Multicast membership for ill */
1640 1643 uint_t ill_global_timer; /* for IGMPv3/MLDv2 general queries */
1641 1644 int ill_mcast_type; /* type of router which is querier */
1642 1645 /* on this interface */
1643 1646 uint16_t ill_mcast_v1_time; /* # slow timeouts since last v1 qry */
1644 1647 uint16_t ill_mcast_v2_time; /* # slow timeouts since last v2 qry */
1645 1648 uint8_t ill_mcast_v1_tset; /* 1 => timer is set; 0 => not set */
1646 1649 uint8_t ill_mcast_v2_tset; /* 1 => timer is set; 0 => not set */
1647 1650
1648 1651 uint8_t ill_mcast_rv; /* IGMPv3/MLDv2 robustness variable */
1649 1652 int ill_mcast_qi; /* IGMPv3/MLDv2 query interval var */
1650 1653
1651 1654 /*
1652 1655 * All non-NULL cells between 'ill_first_mp_to_free' and
1653 1656 * 'ill_last_mp_to_free' are freed in ill_delete.
1654 1657 */
1655 1658 #define ill_first_mp_to_free ill_bcast_mp
1656 1659 mblk_t *ill_bcast_mp; /* DLPI header for broadcasts. */
1657 1660 mblk_t *ill_unbind_mp; /* unbind mp from ill_dl_up() */
1658 1661 mblk_t *ill_promiscoff_mp; /* for ill_leave_allmulti() */
1659 1662 mblk_t *ill_dlpi_deferred; /* b_next chain of control messages */
1660 1663 mblk_t *ill_dest_addr_mp; /* mblk which holds ill_dest_addr */
1661 1664 mblk_t *ill_replumb_mp; /* replumb mp from ill_replumb() */
1662 1665 mblk_t *ill_phys_addr_mp; /* mblk which holds ill_phys_addr */
1663 1666 mblk_t *ill_mcast_deferred; /* b_next chain of IGMP/MLD packets */
1664 1667 #define ill_last_mp_to_free ill_mcast_deferred
1665 1668
1666 1669 cred_t *ill_credp; /* opener's credentials */
1667 1670 uint8_t *ill_phys_addr; /* ill_phys_addr_mp->b_rptr + off */
1668 1671 uint8_t *ill_dest_addr; /* ill_dest_addr_mp->b_rptr + off */
1669 1672
1670 1673 uint_t ill_state_flags; /* see ILL_* flags above */
1671 1674
1672 1675 /* Following bit fields protected by ipsq_t */
1673 1676 uint_t
1674 1677 ill_needs_attach : 1,
1675 1678 ill_reserved : 1,
1676 1679 ill_isv6 : 1,
1677 1680 ill_dlpi_style_set : 1,
1678 1681
1679 1682 ill_ifname_pending : 1,
1680 1683 ill_logical_down : 1,
1681 1684 ill_dl_up : 1,
1682 1685 ill_up_ipifs : 1,
1683 1686
1684 1687 ill_note_link : 1, /* supports link-up notification */
1685 1688 ill_capab_reneg : 1, /* capability renegotiation to be done */
1686 1689 ill_dld_capab_inprog : 1, /* direct dld capab call in prog */
1687 1690 ill_need_recover_multicast : 1,
1688 1691
1689 1692 ill_replumbing : 1,
1690 1693 ill_arl_dlpi_pending : 1,
1691 1694 ill_grp_pending : 1,
1692 1695
1693 1696 ill_pad_to_bit_31 : 17;
1694 1697
1695 1698 /* Following bit fields protected by ill_lock */
1696 1699 uint_t
1697 1700 ill_fragtimer_executing : 1,
1698 1701 ill_fragtimer_needrestart : 1,
1699 1702 ill_manual_token : 1, /* system won't override ill_token */
1700 1703 /*
1701 1704 * ill_manual_linklocal : system will not change the
1702 1705 * linklocal whenever ill_token changes.
1703 1706 */
1704 1707 ill_manual_linklocal : 1,
1705 1708
1706 1709 ill_manual_dst_linklocal : 1, /* same for pt-pt dst linklocal */
1707 1710
1708 1711 ill_pad_bit_31 : 27;
1709 1712
1710 1713 /*
1711 1714 * Used in SIOCSIFMUXID and SIOCGIFMUXID for 'ifconfig unplumb'.
1712 1715 */
1713 1716 int ill_muxid; /* muxid returned from plink */
1714 1717
1715 1718 /* Used for IP frag reassembly throttling on a per ILL basis. */
1716 1719 uint_t ill_ipf_gen; /* Generation of next fragment queue */
1717 1720 uint_t ill_frag_count; /* Count of all reassembly mblk bytes */
1718 1721 uint_t ill_frag_free_num_pkts; /* num of fragmented packets to free */
1719 1722 clock_t ill_last_frag_clean_time; /* time when frag's were pruned */
1720 1723 int ill_type; /* From <net/if_types.h> */
1721 1724 uint_t ill_dlpi_multicast_state; /* See below IDS_* */
1722 1725 uint_t ill_dlpi_fastpath_state; /* See below IDS_* */
1723 1726
1724 1727 /*
1725 1728 * Capabilities related fields.
1726 1729 */
1727 1730 uint_t ill_dlpi_capab_state; /* State of capability query, IDCS_* */
1728 1731 uint_t ill_capab_pending_cnt;
1729 1732 uint64_t ill_capabilities; /* Enabled capabilities, ILL_CAPAB_* */
1730 1733 ill_hcksum_capab_t *ill_hcksum_capab; /* H/W cksumming capabilities */
1731 1734 ill_zerocopy_capab_t *ill_zerocopy_capab; /* Zero-copy capabilities */
1732 1735 ill_dld_capab_t *ill_dld_capab; /* DLD capabilities */
1733 1736 ill_lso_capab_t *ill_lso_capab; /* Large Segment Offload capabilities */
1734 1737 mblk_t *ill_capab_reset_mp; /* Preallocated mblk for capab reset */
1735 1738
1736 1739 uint8_t ill_max_hops; /* Maximum hops for any logical interface */
1737 1740 uint_t ill_user_mtu; /* User-specified MTU via SIOCSLIFLNKINFO */
1738 1741 uint32_t ill_reachable_time; /* Value for ND algorithm in msec */
1739 1742 uint32_t ill_reachable_retrans_time; /* Value for ND algorithm msec */
1740 1743 uint_t ill_max_buf; /* Max # of req to buffer for ND */
1741 1744 in6_addr_t ill_token; /* IPv6 interface id */
1742 1745 in6_addr_t ill_dest_token; /* Destination IPv6 interface id */
1743 1746 uint_t ill_token_length;
1744 1747 uint32_t ill_xmit_count; /* ndp max multicast xmits */
1745 1748 mib2_ipIfStatsEntry_t *ill_ip_mib; /* ver indep. interface mib */
1746 1749 mib2_ipv6IfIcmpEntry_t *ill_icmp6_mib; /* Per interface mib */
1747 1750
1748 1751 phyint_t *ill_phyint;
1749 1752 uint64_t ill_flags;
1750 1753
1751 1754 kmutex_t ill_lock; /* Please see table below */
1752 1755 /*
1753 1756 * The ill_nd_lla* fields handle the link layer address option
1754 1757 * from neighbor discovery. This is used for external IPv6
1755 1758 * address resolution.
1756 1759 */
1757 1760 mblk_t *ill_nd_lla_mp; /* mblk which holds ill_nd_lla */
1758 1761 uint8_t *ill_nd_lla; /* Link Layer Address */
1759 1762 uint_t ill_nd_lla_len; /* Link Layer Address length */
1760 1763 /*
1761 1764 * We have 4 phys_addr_req's sent down. This field keeps track
1762 1765 * of which one is pending.
1763 1766 */
1764 1767 t_uscalar_t ill_phys_addr_pend; /* which dl_phys_addr_req pending */
1765 1768 /*
1766 1769 * Used to save errors that occur during plumbing
1767 1770 */
1768 1771 uint_t ill_ifname_pending_err;
1769 1772 avl_node_t ill_avl_byppa; /* avl node based on ppa */
1770 1773 list_t ill_nce; /* pointer to nce_s list */
1771 1774 uint_t ill_refcnt; /* active refcnt by threads */
1772 1775 uint_t ill_ire_cnt; /* ires associated with this ill */
1773 1776 kcondvar_t ill_cv;
1774 1777 uint_t ill_ncec_cnt; /* ncecs associated with this ill */
1775 1778 uint_t ill_nce_cnt; /* nces associated with this ill */
1776 1779 uint_t ill_waiters; /* threads waiting in ipsq_enter */
1777 1780 /*
1778 1781 * Contains the upper read queue pointer of the module immediately
1779 1782 * beneath IP. This field allows IP to validate sub-capability
1780 1783 * acknowledgments coming up from downstream.
1781 1784 */
1782 1785 queue_t *ill_lmod_rq; /* read queue pointer of module below */
1783 1786 uint_t ill_lmod_cnt; /* number of modules beneath IP */
1784 1787 ip_m_t *ill_media; /* media specific params/functions */
1785 1788 t_uscalar_t ill_dlpi_pending; /* Last DLPI primitive issued */
1786 1789 uint_t ill_usesrc_ifindex; /* use src addr from this ILL */
1787 1790 struct ill_s *ill_usesrc_grp_next; /* Next ILL in the usesrc group */
1788 1791 boolean_t ill_trace_disable; /* True when alloc fails */
1789 1792 zoneid_t ill_zoneid;
1790 1793 ip_stack_t *ill_ipst; /* Corresponds to a netstack_hold */
1791 1794 uint32_t ill_dhcpinit; /* IP_DHCPINIT_IFs for ill */
1792 1795 void *ill_flownotify_mh; /* Tx flow ctl, mac cb handle */
1793 1796 uint_t ill_ilm_cnt; /* ilms referencing this ill */
1794 1797 uint_t ill_ipallmulti_cnt; /* ip_join_allmulti() calls */
1795 1798 ilm_t *ill_ipallmulti_ilm;
1796 1799
1797 1800 mblk_t *ill_saved_ire_mp; /* Allocated for each extra IRE */
1798 1801 /* with ire_ill set so they can */
1799 1802 /* survive the ill going down and up. */
1800 1803 kmutex_t ill_saved_ire_lock; /* Protects ill_saved_ire_mp, cnt */
1801 1804 uint_t ill_saved_ire_cnt; /* # entries */
1802 1805 struct arl_ill_common_s *ill_common;
1803 1806 ire_t *ill_ire_multicast; /* IRE_MULTICAST for ill */
1804 1807 clock_t ill_defend_start; /* start of 1 hour period */
1805 1808 uint_t ill_defend_count; /* # of announce/defends per ill */
1806 1809 /*
1807 1810 * IPMP fields.
1808 1811 */
1809 1812 ipmp_illgrp_t *ill_grp; /* IPMP group information */
1810 1813 list_node_t ill_actnode; /* next active ill in group */
1811 1814 list_node_t ill_grpnode; /* next ill in group */
1812 1815 ipif_t *ill_src_ipif; /* source address selection rotor */
1813 1816 ipif_t *ill_move_ipif; /* ipif awaiting move to new ill */
1814 1817 boolean_t ill_nom_cast; /* nominated for mcast/bcast */
1815 1818 uint_t ill_bound_cnt; /* # of data addresses bound to ill */
1816 1819 ipif_t *ill_bound_ipif; /* ipif chain bound to ill */
1817 1820 timeout_id_t ill_refresh_tid; /* ill refresh retry timeout id */
1818 1821
1819 1822 uint32_t ill_mrouter_cnt; /* mrouter allmulti joins */
1820 1823 uint32_t ill_allowed_ips_cnt;
1821 1824 in6_addr_t *ill_allowed_ips;
1822 1825
1823 1826 /* list of multicast physical addresses joined on this ill */
1824 1827 multiphysaddr_t *ill_mphysaddr_list;
1825 1828 } ill_t;
1826 1829
1827 1830 /*
1828 1831 * ILL_FREE_OK() means that there are no incoming pointer references
1829 1832 * to the ill.
1830 1833 */
1831 1834 #define ILL_FREE_OK(ill) \
1832 1835 ((ill)->ill_ire_cnt == 0 && (ill)->ill_ilm_cnt == 0 && \
1833 1836 (ill)->ill_ncec_cnt == 0 && (ill)->ill_nce_cnt == 0)
1834 1837
1835 1838 /*
1836 1839 * An ipif/ill can be marked down only when the ire and ncec references
1837 1840 * to that ipif/ill goes to zero. ILL_DOWN_OK() is a necessary condition
1838 1841 * quiescence checks. See comments above IPIF_DOWN_OK for details
1839 1842 * on why ires and nces are selectively considered for this macro.
1840 1843 */
1841 1844 #define ILL_DOWN_OK(ill) \
1842 1845 (ill->ill_ire_cnt == 0 && ill->ill_ncec_cnt == 0 && \
1843 1846 ill->ill_nce_cnt == 0)
1844 1847
1845 1848 /*
1846 1849 * The following table lists the protection levels of the various members
1847 1850 * of the ill_t. Same notation as that used for ipif_t above is used.
1848 1851 *
1849 1852 * Write Read
1850 1853 *
1851 1854 * ill_ifptr ill_g_lock + s Write once
1852 1855 * ill_rq ipsq Write once
1853 1856 * ill_wq ipsq Write once
1854 1857 *
1855 1858 * ill_error ipsq None
1856 1859 * ill_ipif ill_g_lock + ipsq ill_g_lock OR ipsq
1857 1860 * ill_ipif_up_count ill_lock + ipsq ill_lock OR ipsq
1858 1861 * ill_max_frag ill_lock ill_lock
1859 1862 * ill_current_frag ill_lock ill_lock
1860 1863 *
1861 1864 * ill_name ill_g_lock + ipsq Write once
1862 1865 * ill_name_length ill_g_lock + ipsq Write once
1863 1866 * ill_ndd_name ipsq Write once
1864 1867 * ill_net_type ipsq Write once
1865 1868 * ill_ppa ill_g_lock + ipsq Write once
1866 1869 * ill_sap ipsq + down ill Write once
1867 1870 * ill_sap_length ipsq + down ill Write once
1868 1871 * ill_phys_addr_length ipsq + down ill Write once
1869 1872 *
1870 1873 * ill_bcast_addr_length ipsq ipsq
1871 1874 * ill_mactype ipsq ipsq
1872 1875 * ill_frag_ptr ipsq ipsq
1873 1876 *
1874 1877 * ill_frag_timer_id ill_lock ill_lock
1875 1878 * ill_frag_hash_tbl ipsq up ill
1876 1879 * ill_ilm ill_mcast_lock(WRITER) ill_mcast_lock(READER)
1877 1880 * ill_global_timer ill_mcast_lock(WRITER) ill_mcast_lock(READER)
1878 1881 * ill_mcast_type ill_mcast_lock(WRITER) ill_mcast_lock(READER)
1879 1882 * ill_mcast_v1_time ill_mcast_lock(WRITER) ill_mcast_lock(READER)
1880 1883 * ill_mcast_v2_time ill_mcast_lock(WRITER) ill_mcast_lock(READER)
1881 1884 * ill_mcast_v1_tset ill_mcast_lock(WRITER) ill_mcast_lock(READER)
1882 1885 * ill_mcast_v2_tset ill_mcast_lock(WRITER) ill_mcast_lock(READER)
1883 1886 * ill_mcast_rv ill_mcast_lock(WRITER) ill_mcast_lock(READER)
1884 1887 * ill_mcast_qi ill_mcast_lock(WRITER) ill_mcast_lock(READER)
1885 1888 *
1886 1889 * ill_down_mp ipsq ipsq
1887 1890 * ill_dlpi_deferred ill_lock ill_lock
1888 1891 * ill_dlpi_pending ipsq + ill_lock ipsq or ill_lock or
1889 1892 * absence of ipsq writer.
1890 1893 * ill_phys_addr_mp ipsq + down ill only when ill is up
1891 1894 * ill_mcast_deferred ill_lock ill_lock
1892 1895 * ill_phys_addr ipsq + down ill only when ill is up
1893 1896 * ill_dest_addr_mp ipsq + down ill only when ill is up
1894 1897 * ill_dest_addr ipsq + down ill only when ill is up
1895 1898 *
1896 1899 * ill_state_flags ill_lock ill_lock
1897 1900 * exclusive bit flags ipsq_t ipsq_t
1898 1901 * shared bit flags ill_lock ill_lock
1899 1902 *
1900 1903 * ill_muxid ipsq Not atomic
1901 1904 *
1902 1905 * ill_ipf_gen Not atomic
1903 1906 * ill_frag_count atomics atomics
1904 1907 * ill_type ipsq + down ill only when ill is up
1905 1908 * ill_dlpi_multicast_state ill_lock ill_lock
1906 1909 * ill_dlpi_fastpath_state ill_lock ill_lock
1907 1910 * ill_dlpi_capab_state ipsq ipsq
1908 1911 * ill_max_hops ipsq Not atomic
1909 1912 *
1910 1913 * ill_mtu ill_lock None
1911 1914 * ill_mc_mtu ill_lock None
1912 1915 *
1913 1916 * ill_user_mtu ipsq + ill_lock ill_lock
1914 1917 * ill_reachable_time ipsq + ill_lock ill_lock
1915 1918 * ill_reachable_retrans_time ipsq + ill_lock ill_lock
1916 1919 * ill_max_buf ipsq + ill_lock ill_lock
1917 1920 *
1918 1921 * Next 2 fields need ill_lock because of the get ioctls. They should not
1919 1922 * report partially updated results without executing in the ipsq.
1920 1923 * ill_token ipsq + ill_lock ill_lock
1921 1924 * ill_token_length ipsq + ill_lock ill_lock
1922 1925 * ill_dest_token ipsq + down ill only when ill is up
1923 1926 * ill_xmit_count ipsq + down ill write once
1924 1927 * ill_ip6_mib ipsq + down ill only when ill is up
1925 1928 * ill_icmp6_mib ipsq + down ill only when ill is up
1926 1929 *
1927 1930 * ill_phyint ipsq, ill_g_lock, ill_lock Any of them
1928 1931 * ill_flags ill_lock ill_lock
1929 1932 * ill_nd_lla_mp ipsq + down ill only when ill is up
1930 1933 * ill_nd_lla ipsq + down ill only when ill is up
1931 1934 * ill_nd_lla_len ipsq + down ill only when ill is up
1932 1935 * ill_phys_addr_pend ipsq + down ill only when ill is up
1933 1936 * ill_ifname_pending_err ipsq ipsq
1934 1937 * ill_avl_byppa ipsq, ill_g_lock write once
1935 1938 *
1936 1939 * ill_fastpath_list ill_lock ill_lock
1937 1940 * ill_refcnt ill_lock ill_lock
1938 1941 * ill_ire_cnt ill_lock ill_lock
1939 1942 * ill_cv ill_lock ill_lock
1940 1943 * ill_ncec_cnt ill_lock ill_lock
1941 1944 * ill_nce_cnt ill_lock ill_lock
1942 1945 * ill_ilm_cnt ill_lock ill_lock
1943 1946 * ill_src_ipif ill_g_lock ill_g_lock
1944 1947 * ill_trace ill_lock ill_lock
1945 1948 * ill_usesrc_grp_next ill_g_usesrc_lock ill_g_usesrc_lock
1946 1949 * ill_dhcpinit atomics atomics
1947 1950 * ill_flownotify_mh write once write once
1948 1951 * ill_capab_pending_cnt ipsq ipsq
1949 1952 * ill_ipallmulti_cnt ill_lock ill_lock
1950 1953 * ill_ipallmulti_ilm ill_lock ill_lock
1951 1954 * ill_saved_ire_mp ill_saved_ire_lock ill_saved_ire_lock
1952 1955 * ill_saved_ire_cnt ill_saved_ire_lock ill_saved_ire_lock
1953 1956 * ill_arl ??? ???
1954 1957 * ill_ire_multicast ipsq + quiescent none
1955 1958 * ill_bound_ipif ipsq ipsq
1956 1959 * ill_actnode ipsq + ipmp_lock ipsq OR ipmp_lock
1957 1960 * ill_grpnode ipsq + ill_g_lock ipsq OR ill_g_lock
1958 1961 * ill_src_ipif ill_g_lock ill_g_lock
1959 1962 * ill_move_ipif ipsq ipsq
1960 1963 * ill_nom_cast ipsq ipsq OR advisory
1961 1964 * ill_refresh_tid ill_lock ill_lock
1962 1965 * ill_grp (for IPMP ill) write once write once
1963 1966 * ill_grp (for underlying ill) ipsq + ill_g_lock ipsq OR ill_g_lock
1964 1967 * ill_grp_pending ill_mcast_serializer ill_mcast_serializer
1965 1968 * ill_mrouter_cnt atomics atomics
1966 1969 * ill_mphysaddr_list ill_lock ill_lock
1967 1970 *
1968 1971 * NOTE: It's OK to make heuristic decisions on an underlying interface
1969 1972 * by using IS_UNDER_IPMP() or comparing ill_grp's raw pointer value.
1970 1973 */
1971 1974
1972 1975 /*
1973 1976 * For ioctl restart mechanism see ip_reprocess_ioctl()
1974 1977 */
1975 1978 struct ip_ioctl_cmd_s;
1976 1979
1977 1980 typedef int (*ifunc_t)(ipif_t *, struct sockaddr_in *, queue_t *, mblk_t *,
1978 1981 struct ip_ioctl_cmd_s *, void *);
1979 1982
1980 1983 typedef struct ip_ioctl_cmd_s {
1981 1984 int ipi_cmd;
1982 1985 size_t ipi_copyin_size;
1983 1986 uint_t ipi_flags;
1984 1987 uint_t ipi_cmd_type;
1985 1988 ifunc_t ipi_func;
1986 1989 ifunc_t ipi_func_restart;
1987 1990 } ip_ioctl_cmd_t;
1988 1991
1989 1992 /*
1990 1993 * ipi_cmd_type:
1991 1994 *
1992 1995 * IF_CMD 1 old style ifreq cmd
1993 1996 * LIF_CMD 2 new style lifreq cmd
1994 1997 * ARP_CMD 3 arpreq cmd
1995 1998 * XARP_CMD 4 xarpreq cmd
1996 1999 * MSFILT_CMD 5 multicast source filter cmd
1997 2000 * MISC_CMD 6 misc cmd (not a more specific one above)
1998 2001 */
1999 2002
2000 2003 enum { IF_CMD = 1, LIF_CMD, ARP_CMD, XARP_CMD, MSFILT_CMD, MISC_CMD };
2001 2004
2002 2005 #define IPI_DONTCARE 0 /* For ioctl encoded values that don't matter */
2003 2006
2004 2007 /* Flag values in ipi_flags */
2005 2008 #define IPI_PRIV 0x1 /* Root only command */
2006 2009 #define IPI_MODOK 0x2 /* Permitted on mod instance of IP */
2007 2010 #define IPI_WR 0x4 /* Need to grab writer access */
2008 2011 #define IPI_GET_CMD 0x8 /* branch to mi_copyout on success */
2009 2012 /* unused 0x10 */
2010 2013 #define IPI_NULL_BCONT 0x20 /* ioctl has not data and hence no b_cont */
2011 2014
2012 2015 extern ip_ioctl_cmd_t ip_ndx_ioctl_table[];
2013 2016 extern ip_ioctl_cmd_t ip_misc_ioctl_table[];
2014 2017 extern int ip_ndx_ioctl_count;
2015 2018 extern int ip_misc_ioctl_count;
2016 2019
2017 2020 /* Passed down by ARP to IP during I_PLINK/I_PUNLINK */
2018 2021 typedef struct ipmx_s {
2019 2022 char ipmx_name[LIFNAMSIZ]; /* if name */
2020 2023 uint_t
2021 2024 ipmx_arpdev_stream : 1, /* This is the arp stream */
2022 2025 ipmx_notused : 31;
2023 2026 } ipmx_t;
2024 2027
2025 2028 /*
2026 2029 * State for detecting if a driver supports certain features.
2027 2030 * Support for DL_ENABMULTI_REQ uses ill_dlpi_multicast_state.
2028 2031 * Support for DLPI M_DATA fastpath uses ill_dlpi_fastpath_state.
2029 2032 */
2030 2033 #define IDS_UNKNOWN 0 /* No DLPI request sent */
2031 2034 #define IDS_INPROGRESS 1 /* DLPI request sent */
2032 2035 #define IDS_OK 2 /* DLPI request completed successfully */
2033 2036 #define IDS_FAILED 3 /* DLPI request failed */
2034 2037
2035 2038 /* Support for DL_CAPABILITY_REQ uses ill_dlpi_capab_state. */
2036 2039 enum {
2037 2040 IDCS_UNKNOWN,
2038 2041 IDCS_PROBE_SENT,
2039 2042 IDCS_OK,
2040 2043 IDCS_RESET_SENT,
2041 2044 IDCS_RENEG,
2042 2045 IDCS_FAILED
2043 2046 };
2044 2047
2045 2048 /* Extended NDP Management Structure */
2046 2049 typedef struct ipndp_s {
2047 2050 ndgetf_t ip_ndp_getf;
2048 2051 ndsetf_t ip_ndp_setf;
2049 2052 caddr_t ip_ndp_data;
2050 2053 char *ip_ndp_name;
2051 2054 } ipndp_t;
2052 2055
2053 2056 /* IXA Notification types */
2054 2057 typedef enum {
2055 2058 IXAN_LSO, /* LSO capability change */
2056 2059 IXAN_PMTU, /* PMTU change */
2057 2060 IXAN_ZCOPY /* ZEROCOPY capability change */
2058 2061 } ixa_notify_type_t;
2059 2062
2060 2063 typedef uint_t ixa_notify_arg_t;
2061 2064
2062 2065 typedef void (*ixa_notify_t)(void *, ip_xmit_attr_t *ixa, ixa_notify_type_t,
2063 2066 ixa_notify_arg_t);
2064 2067
2065 2068 /*
2066 2069 * Attribute flags that are common to the transmit and receive attributes
2067 2070 */
2068 2071 #define IAF_IS_IPV4 0x80000000 /* ipsec_*_v4 */
2069 2072 #define IAF_TRUSTED_ICMP 0x40000000 /* ipsec_*_icmp_loopback */
2070 2073 #define IAF_NO_LOOP_ZONEID_SET 0x20000000 /* Zone that shouldn't have */
2071 2074 /* a copy */
2072 2075 #define IAF_LOOPBACK_COPY 0x10000000 /* For multi and broadcast */
2073 2076
2074 2077 #define IAF_MASK 0xf0000000 /* Flags that are common */
2075 2078
2076 2079 /*
2077 2080 * Transmit side attributes used between the transport protocols and IP as
2078 2081 * well as inside IP. It is also used to cache information in the conn_t i.e.
2079 2082 * replaces conn_ire and the IPsec caching in the conn_t.
2080 2083 */
2081 2084 struct ip_xmit_attr_s {
2082 2085 iaflags_t ixa_flags; /* IXAF_*. See below */
2083 2086
2084 2087 uint32_t ixa_free_flags; /* IXA_FREE_*. See below */
2085 2088 uint32_t ixa_refcnt; /* Using atomics */
2086 2089
2087 2090 /*
2088 2091 * Always initialized independently of ixa_flags settings.
2089 2092 * Used by ip_xmit so we keep them up front for cache locality.
2090 2093 */
2091 2094 uint32_t ixa_xmit_hint; /* For ECMP and GLD TX ring fanout */
2092 2095 uint_t ixa_pktlen; /* Always set. For frag and stats */
2093 2096 zoneid_t ixa_zoneid; /* Assumed always set */
2094 2097
2095 2098 /* Always set for conn_ip_output(); might be stale */
2096 2099 /*
2097 2100 * Since TCP keeps the conn_t around past the process going away
2098 2101 * we need to use the "notr" (e.g, ire_refhold_notr) for ixa_ire,
2099 2102 * ixa_nce, and ixa_dce.
2100 2103 */
2101 2104 ire_t *ixa_ire; /* Forwarding table entry */
2102 2105 uint_t ixa_ire_generation;
2103 2106 nce_t *ixa_nce; /* Neighbor cache entry */
2104 2107 dce_t *ixa_dce; /* Destination cache entry */
2105 2108 uint_t ixa_dce_generation;
2106 2109 uint_t ixa_src_generation; /* If IXAF_VERIFY_SOURCE */
2107 2110
2108 2111 uint32_t ixa_src_preferences; /* prefs for src addr select */
2109 2112 uint32_t ixa_pmtu; /* IXAF_VERIFY_PMTU */
2110 2113
2111 2114 /* Set by ULP if IXAF_VERIFY_PMTU; otherwise set by IP */
2112 2115 uint32_t ixa_fragsize;
2113 2116
2114 2117 int8_t ixa_use_min_mtu; /* IXAF_USE_MIN_MTU values */
2115 2118
2116 2119 pfirepostfrag_t ixa_postfragfn; /* Set internally in IP */
2117 2120
2118 2121 in6_addr_t ixa_nexthop_v6; /* IXAF_NEXTHOP_SET */
2119 2122 #define ixa_nexthop_v4 V4_PART_OF_V6(ixa_nexthop_v6)
2120 2123
2121 2124 zoneid_t ixa_no_loop_zoneid; /* IXAF_NO_LOOP_ZONEID_SET */
2122 2125
2123 2126 uint_t ixa_scopeid; /* For IPv6 link-locals */
2124 2127
2125 2128 uint_t ixa_broadcast_ttl; /* IXAF_BROACAST_TTL_SET */
2126 2129
2127 2130 uint_t ixa_multicast_ttl; /* Assumed set for multicast */
2128 2131 uint_t ixa_multicast_ifindex; /* Assumed set for multicast */
2129 2132 ipaddr_t ixa_multicast_ifaddr; /* Assumed set for multicast */
2130 2133
2131 2134 int ixa_raw_cksum_offset; /* If IXAF_SET_RAW_CKSUM */
2132 2135
2133 2136 uint32_t ixa_ident; /* For IPv6 fragment header */
2134 2137
2135 2138 uint64_t ixa_conn_id; /* Used by DTrace */
2136 2139 /*
2137 2140 * Cached LSO information.
2138 2141 */
2139 2142 ill_lso_capab_t ixa_lso_capab; /* Valid when IXAF_LSO_CAPAB */
2140 2143
2141 2144 uint64_t ixa_ipsec_policy_gen; /* Generation from iph_gen */
2142 2145 /*
2143 2146 * The following IPsec fields are only initialized when
2144 2147 * IXAF_IPSEC_SECURE is set. Otherwise they contain garbage.
2145 2148 */
2146 2149 ipsec_latch_t *ixa_ipsec_latch; /* Just the ids */
2147 2150 struct ipsa_s *ixa_ipsec_ah_sa; /* Hard reference SA for AH */
2148 2151 struct ipsa_s *ixa_ipsec_esp_sa; /* Hard reference SA for ESP */
2149 2152 struct ipsec_policy_s *ixa_ipsec_policy; /* why are we here? */
2150 2153 struct ipsec_action_s *ixa_ipsec_action; /* For reflected packets */
2151 2154 ipsa_ref_t ixa_ipsec_ref[2]; /* Soft reference to SA */
2152 2155 /* 0: ESP, 1: AH */
2153 2156
2154 2157 /*
2155 2158 * The selectors here are potentially different than the SPD rule's
2156 2159 * selectors, and we need to have both available for IKEv2.
2157 2160 *
2158 2161 * NOTE: "Source" and "Dest" are w.r.t. outbound datagrams. Ports can
2159 2162 * be zero, and the protocol number is needed to make the ports
2160 2163 * significant.
2161 2164 */
2162 2165 uint16_t ixa_ipsec_src_port; /* Source port number of d-gram. */
2163 2166 uint16_t ixa_ipsec_dst_port; /* Destination port number of d-gram. */
2164 2167 uint8_t ixa_ipsec_icmp_type; /* ICMP type of d-gram */
2165 2168 uint8_t ixa_ipsec_icmp_code; /* ICMP code of d-gram */
2166 2169
2167 2170 sa_family_t ixa_ipsec_inaf; /* Inner address family */
2168 2171 #define IXA_MAX_ADDRLEN 4 /* Max addr len. (in 32-bit words) */
2169 2172 uint32_t ixa_ipsec_insrc[IXA_MAX_ADDRLEN]; /* Inner src address */
2170 2173 uint32_t ixa_ipsec_indst[IXA_MAX_ADDRLEN]; /* Inner dest address */
2171 2174 uint8_t ixa_ipsec_insrcpfx; /* Inner source prefix */
2172 2175 uint8_t ixa_ipsec_indstpfx; /* Inner destination prefix */
2173 2176
2174 2177 uint8_t ixa_ipsec_proto; /* IP protocol number for d-gram. */
2175 2178
2176 2179 /* Always initialized independently of ixa_flags settings */
2177 2180 uint_t ixa_ifindex; /* Assumed always set */
2178 2181 uint16_t ixa_ip_hdr_length; /* Points to ULP header */
2179 2182 uint8_t ixa_protocol; /* Protocol number for ULP cksum */
2180 2183 ts_label_t *ixa_tsl; /* Always set. NULL if not TX */
2181 2184 ip_stack_t *ixa_ipst; /* Always set */
2182 2185 uint32_t ixa_extra_ident; /* Set if LSO */
2183 2186 cred_t *ixa_cred; /* For getpeerucred */
2184 2187 pid_t ixa_cpid; /* For getpeerucred */
2185 2188
2186 2189 #ifdef DEBUG
2187 2190 kthread_t *ixa_curthread; /* For serialization assert */
2188 2191 #endif
2189 2192 squeue_t *ixa_sqp; /* Set from conn_sqp as a hint */
2190 2193 uintptr_t ixa_cookie; /* cookie to use for tx flow control */
2191 2194
2192 2195 /*
2193 2196 * Must be set by ULP if any of IXAF_VERIFY_LSO, IXAF_VERIFY_PMTU,
2194 2197 * or IXAF_VERIFY_ZCOPY is set.
2195 2198 */
2196 2199 ixa_notify_t ixa_notify; /* Registered upcall notify function */
2197 2200 void *ixa_notify_cookie; /* ULP cookie for ixa_notify */
2198 2201 };
2199 2202
2200 2203 /*
2201 2204 * Flags to indicate which transmit attributes are set.
2202 2205 * Split into "xxx_SET" ones which indicate that the "xxx" field it set, and
2203 2206 * single flags.
2204 2207 */
2205 2208 #define IXAF_REACH_CONF 0x00000001 /* Reachability confirmation */
2206 2209 #define IXAF_BROADCAST_TTL_SET 0x00000002 /* ixa_broadcast_ttl valid */
2207 2210 #define IXAF_SET_SOURCE 0x00000004 /* Replace if broadcast */
2208 2211 #define IXAF_USE_MIN_MTU 0x00000008 /* IPV6_USE_MIN_MTU */
2209 2212
2210 2213 #define IXAF_DONTFRAG 0x00000010 /* IP*_DONTFRAG */
2211 2214 #define IXAF_VERIFY_PMTU 0x00000020 /* ixa_pmtu/ixa_fragsize set */
2212 2215 #define IXAF_PMTU_DISCOVERY 0x00000040 /* Create/use PMTU state */
2213 2216 #define IXAF_MULTICAST_LOOP 0x00000080 /* IP_MULTICAST_LOOP */
2214 2217
2215 2218 #define IXAF_IPSEC_SECURE 0x00000100 /* Need IPsec processing */
2216 2219 #define IXAF_UCRED_TSL 0x00000200 /* ixa_tsl from SCM_UCRED */
2217 2220 #define IXAF_DONTROUTE 0x00000400 /* SO_DONTROUTE */
2218 2221 #define IXAF_NO_IPSEC 0x00000800 /* Ignore policy */
2219 2222
2220 2223 #define IXAF_PMTU_TOO_SMALL 0x00001000 /* PMTU too small */
2221 2224 #define IXAF_SET_ULP_CKSUM 0x00002000 /* Calculate ULP checksum */
2222 2225 #define IXAF_VERIFY_SOURCE 0x00004000 /* Check that source is ok */
2223 2226 #define IXAF_NEXTHOP_SET 0x00008000 /* ixa_nexthop set */
2224 2227
2225 2228 #define IXAF_PMTU_IPV4_DF 0x00010000 /* Set IPv4 DF */
2226 2229 #define IXAF_NO_DEV_FLOW_CTL 0x00020000 /* Protocol needs no flow ctl */
2227 2230 #define IXAF_NO_TTL_CHANGE 0x00040000 /* Internal to IP */
2228 2231 #define IXAF_IPV6_ADD_FRAGHDR 0x00080000 /* Add fragment header */
2229 2232
2230 2233 #define IXAF_IPSEC_TUNNEL 0x00100000 /* Tunnel mode */
2231 2234 #define IXAF_NO_PFHOOK 0x00200000 /* Skip xmit pfhook */
2232 2235 #define IXAF_NO_TRACE 0x00400000 /* When back from ARP/ND */
2233 2236 #define IXAF_SCOPEID_SET 0x00800000 /* ixa_scopeid set */
2234 2237
2235 2238 #define IXAF_MULTIRT_MULTICAST 0x01000000 /* MULTIRT for multicast */
2236 2239 #define IXAF_NO_HW_CKSUM 0x02000000 /* Force software cksum */
2237 2240 #define IXAF_SET_RAW_CKSUM 0x04000000 /* Use ixa_raw_cksum_offset */
2238 2241 #define IXAF_IPSEC_GLOBAL_POLICY 0x08000000 /* Policy came from global */
2239 2242
2240 2243 /* Note the following uses bits 0x10000000 through 0x80000000 */
2241 2244 #define IXAF_IS_IPV4 IAF_IS_IPV4
2242 2245 #define IXAF_TRUSTED_ICMP IAF_TRUSTED_ICMP
2243 2246 #define IXAF_NO_LOOP_ZONEID_SET IAF_NO_LOOP_ZONEID_SET
2244 2247 #define IXAF_LOOPBACK_COPY IAF_LOOPBACK_COPY
2245 2248
2246 2249 /* Note: use the upper 32 bits */
2247 2250 #define IXAF_VERIFY_LSO 0x100000000 /* Check LSO capability */
2248 2251 #define IXAF_LSO_CAPAB 0x200000000 /* Capable of LSO */
2249 2252 #define IXAF_VERIFY_ZCOPY 0x400000000 /* Check Zero Copy capability */
2250 2253 #define IXAF_ZCOPY_CAPAB 0x800000000 /* Capable of ZEROCOPY */
2251 2254
2252 2255 /*
2253 2256 * The normal flags for sending packets e.g., icmp errors
2254 2257 */
2255 2258 #define IXAF_BASIC_SIMPLE_V4 \
2256 2259 (IXAF_SET_ULP_CKSUM | IXAF_IS_IPV4 | IXAF_VERIFY_SOURCE)
2257 2260 #define IXAF_BASIC_SIMPLE_V6 (IXAF_SET_ULP_CKSUM | IXAF_VERIFY_SOURCE)
2258 2261
2259 2262 /*
2260 2263 * Normally these fields do not have a hold. But in some cases they do, for
2261 2264 * instance when we've gone through ip_*_attr_to/from_mblk.
2262 2265 * We use ixa_free_flags to indicate that they have a hold and need to be
2263 2266 * released on cleanup.
2264 2267 */
2265 2268 #define IXA_FREE_CRED 0x00000001 /* ixa_cred needs to be rele */
2266 2269 #define IXA_FREE_TSL 0x00000002 /* ixa_tsl needs to be rele */
2267 2270
2268 2271 /*
2269 2272 * Simplistic way to set the ixa_xmit_hint for locally generated traffic
2270 2273 * and forwarded traffic. The shift amount are based on the size of the
2271 2274 * structs to discard the low order bits which don't have much if any variation
2272 2275 * (coloring in kmem_cache_alloc might provide some variation).
2273 2276 *
2274 2277 * Basing the locally generated hint on the address of the conn_t means that
2275 2278 * the packets from the same socket/connection do not get reordered.
2276 2279 * Basing the hint for forwarded traffic on the ill_ring_t means that
2277 2280 * packets from the same NIC+ring are likely to use the same outbound ring
2278 2281 * hence we get low contention on the ring in the transmitting driver.
2279 2282 */
2280 2283 #define CONN_TO_XMIT_HINT(connp) ((uint32_t)(((uintptr_t)connp) >> 11))
2281 2284 #define ILL_RING_TO_XMIT_HINT(ring) ((uint32_t)(((uintptr_t)ring) >> 7))
2282 2285
2283 2286 /*
2284 2287 * IP set Destination Flags used by function ip_set_destination,
2285 2288 * ip_attr_connect, and conn_connect.
2286 2289 */
2287 2290 #define IPDF_ALLOW_MCBC 0x1 /* Allow multi/broadcast */
2288 2291 #define IPDF_VERIFY_DST 0x2 /* Verify destination addr */
2289 2292 #define IPDF_SELECT_SRC 0x4 /* Select source address */
2290 2293 #define IPDF_LSO 0x8 /* Try LSO */
2291 2294 #define IPDF_IPSEC 0x10 /* Set IPsec policy */
2292 2295 #define IPDF_ZONE_IS_GLOBAL 0x20 /* From conn_zone_is_global */
2293 2296 #define IPDF_ZCOPY 0x40 /* Try ZEROCOPY */
2294 2297 #define IPDF_UNIQUE_DCE 0x80 /* Get a per-destination DCE */
2295 2298
2296 2299 /*
2297 2300 * Receive side attributes used between the transport protocols and IP as
2298 2301 * well as inside IP.
2299 2302 */
2300 2303 struct ip_recv_attr_s {
2301 2304 iaflags_t ira_flags; /* See below */
2302 2305
2303 2306 uint32_t ira_free_flags; /* IRA_FREE_*. See below */
2304 2307
2305 2308 /*
2306 2309 * This is a hint for TCP SYN packets.
2307 2310 * Always initialized independently of ira_flags settings
2308 2311 */
2309 2312 squeue_t *ira_sqp;
2310 2313 ill_rx_ring_t *ira_ring; /* Internal to IP */
2311 2314
2312 2315 /* For ip_accept_tcp when IRAF_TARGET_SQP is set */
2313 2316 squeue_t *ira_target_sqp;
2314 2317 mblk_t *ira_target_sqp_mp;
2315 2318
2316 2319 /* Always initialized independently of ira_flags settings */
2317 2320 uint32_t ira_xmit_hint; /* For ECMP and GLD TX ring fanout */
2318 2321 zoneid_t ira_zoneid; /* ALL_ZONES unless local delivery */
2319 2322 uint_t ira_pktlen; /* Always set. For frag and stats */
2320 2323 uint16_t ira_ip_hdr_length; /* Points to ULP header */
2321 2324 uint8_t ira_protocol; /* Protocol number for ULP cksum */
2322 2325 uint_t ira_rifindex; /* Received ifindex */
2323 2326 uint_t ira_ruifindex; /* Received upper ifindex */
2324 2327 ts_label_t *ira_tsl; /* Always set. NULL if not TX */
2325 2328 /*
2326 2329 * ira_rill and ira_ill is set inside IP, but not when conn_recv is
2327 2330 * called; ULPs should use ira_ruifindex instead.
2328 2331 */
2329 2332 ill_t *ira_rill; /* ill where packet came */
2330 2333 ill_t *ira_ill; /* ill where IP address hosted */
2331 2334 cred_t *ira_cred; /* For getpeerucred */
2332 2335 pid_t ira_cpid; /* For getpeerucred */
2333 2336
2334 2337 /* Used when IRAF_VERIFIED_SRC is set; this source was ok */
2335 2338 ipaddr_t ira_verified_src;
2336 2339
2337 2340 /*
2338 2341 * The following IPsec fields are only initialized when
2339 2342 * IRAF_IPSEC_SECURE is set. Otherwise they contain garbage.
2340 2343 */
2341 2344 struct ipsec_action_s *ira_ipsec_action; /* how we made it in.. */
2342 2345 struct ipsa_s *ira_ipsec_ah_sa; /* SA for AH */
2343 2346 struct ipsa_s *ira_ipsec_esp_sa; /* SA for ESP */
2344 2347
2345 2348 ipaddr_t ira_mroute_tunnel; /* IRAF_MROUTE_TUNNEL_SET */
2346 2349
2347 2350 zoneid_t ira_no_loop_zoneid; /* IRAF_NO_LOOP_ZONEID_SET */
2348 2351
2349 2352 uint32_t ira_esp_udp_ports; /* IRAF_ESP_UDP_PORTS */
2350 2353
2351 2354 /*
2352 2355 * For IP_RECVSLLA and ip_ndp_conflict/find_solicitation.
2353 2356 * Same size as max for sockaddr_dl
2354 2357 */
2355 2358 #define IRA_L2SRC_SIZE 244
2356 2359 uint8_t ira_l2src[IRA_L2SRC_SIZE]; /* If IRAF_L2SRC_SET */
2357 2360
2358 2361 /*
2359 2362 * Local handle that we use to do lazy setting of ira_l2src.
2360 2363 * We defer setting l2src until needed but we do before any
2361 2364 * ip_input pullupmsg or copymsg.
2362 2365 */
2363 2366 struct mac_header_info_s *ira_mhip; /* Could be NULL */
2364 2367 };
2365 2368
2366 2369 /*
2367 2370 * Flags to indicate which receive attributes are set.
2368 2371 */
2369 2372 #define IRAF_SYSTEM_LABELED 0x00000001 /* is_system_labeled() */
2370 2373 #define IRAF_IPV4_OPTIONS 0x00000002 /* Performance */
2371 2374 #define IRAF_MULTICAST 0x00000004 /* Was multicast at L3 */
2372 2375 #define IRAF_BROADCAST 0x00000008 /* Was broadcast at L3 */
2373 2376 #define IRAF_MULTIBROADCAST (IRAF_MULTICAST|IRAF_BROADCAST)
2374 2377
2375 2378 #define IRAF_LOOPBACK 0x00000010 /* Looped back by IP */
2376 2379 #define IRAF_VERIFY_IP_CKSUM 0x00000020 /* Need to verify IP */
2377 2380 #define IRAF_VERIFY_ULP_CKSUM 0x00000040 /* Need to verify TCP,UDP,etc */
2378 2381 #define IRAF_SCTP_CSUM_ERR 0x00000080 /* sctp pkt has failed chksum */
2379 2382
2380 2383 #define IRAF_IPSEC_SECURE 0x00000100 /* Passed AH and/or ESP */
2381 2384 #define IRAF_DHCP_UNICAST 0x00000200
2382 2385 #define IRAF_IPSEC_DECAPS 0x00000400 /* Was packet decapsulated */
2383 2386 /* from a matching inner packet? */
2384 2387 #define IRAF_TARGET_SQP 0x00000800 /* ira_target_sqp is set */
2385 2388 #define IRAF_VERIFIED_SRC 0x00001000 /* ira_verified_src set */
2386 2389 #define IRAF_RSVP 0x00002000 /* RSVP packet for rsvpd */
2387 2390 #define IRAF_MROUTE_TUNNEL_SET 0x00004000 /* From ip_mroute_decap */
2388 2391 #define IRAF_PIM_REGISTER 0x00008000 /* From register_mforward */
2389 2392
2390 2393 #define IRAF_TX_MAC_EXEMPTABLE 0x00010000 /* Allow MAC_EXEMPT readdown */
2391 2394 #define IRAF_TX_SHARED_ADDR 0x00020000 /* Arrived on ALL_ZONES addr */
2392 2395 #define IRAF_ESP_UDP_PORTS 0x00040000 /* NAT-traversal packet */
2393 2396 #define IRAF_NO_HW_CKSUM 0x00080000 /* Force software cksum */
2394 2397
2395 2398 #define IRAF_ICMP_ERROR 0x00100000 /* Send to conn_recvicmp */
2396 2399 #define IRAF_ROUTER_ALERT 0x00200000 /* IPv6 router alert */
2397 2400 #define IRAF_L2SRC_SET 0x00400000 /* ira_l2src has been set */
2398 2401 #define IRAF_L2SRC_LOOPBACK 0x00800000 /* Came from us */
2399 2402
2400 2403 #define IRAF_L2DST_MULTICAST 0x01000000 /* Multicast at L2 */
2401 2404 #define IRAF_L2DST_BROADCAST 0x02000000 /* Broadcast at L2 */
2402 2405 /* Unused 0x04000000 */
2403 2406 /* Unused 0x08000000 */
2404 2407
2405 2408 /* Below starts with 0x10000000 */
2406 2409 #define IRAF_IS_IPV4 IAF_IS_IPV4
2407 2410 #define IRAF_TRUSTED_ICMP IAF_TRUSTED_ICMP
2408 2411 #define IRAF_NO_LOOP_ZONEID_SET IAF_NO_LOOP_ZONEID_SET
2409 2412 #define IRAF_LOOPBACK_COPY IAF_LOOPBACK_COPY
2410 2413
2411 2414 /*
2412 2415 * Normally these fields do not have a hold. But in some cases they do, for
2413 2416 * instance when we've gone through ip_*_attr_to/from_mblk.
2414 2417 * We use ira_free_flags to indicate that they have a hold and need to be
2415 2418 * released on cleanup.
2416 2419 */
2417 2420 #define IRA_FREE_CRED 0x00000001 /* ira_cred needs to be rele */
2418 2421 #define IRA_FREE_TSL 0x00000002 /* ira_tsl needs to be rele */
2419 2422
2420 2423 /*
2421 2424 * Optional destination cache entry for path MTU information,
2422 2425 * and ULP metrics.
2423 2426 */
2424 2427 struct dce_s {
2425 2428 uint_t dce_generation; /* Changed since cached? */
2426 2429 uint_t dce_flags; /* See below */
2427 2430 uint_t dce_ipversion; /* IPv4/IPv6 version */
2428 2431 uint32_t dce_pmtu; /* Path MTU if DCEF_PMTU */
2429 2432 uint32_t dce_ident; /* Per destination IP ident. */
2430 2433 iulp_t dce_uinfo; /* Metrics if DCEF_UINFO */
2431 2434
2432 2435 struct dce_s *dce_next;
2433 2436 struct dce_s **dce_ptpn;
2434 2437 struct dcb_s *dce_bucket;
2435 2438
2436 2439 union {
2437 2440 in6_addr_t dceu_v6addr;
2438 2441 ipaddr_t dceu_v4addr;
2439 2442 } dce_u;
2440 2443 #define dce_v4addr dce_u.dceu_v4addr
2441 2444 #define dce_v6addr dce_u.dceu_v6addr
2442 2445 /* Note that for IPv6+IPMP we use the ifindex for the upper interface */
2443 2446 uint_t dce_ifindex; /* For IPv6 link-locals */
2444 2447
2445 2448 kmutex_t dce_lock;
2446 2449 uint_t dce_refcnt;
2447 2450 uint64_t dce_last_change_time; /* Path MTU. In seconds */
2448 2451
2449 2452 ip_stack_t *dce_ipst; /* Does not have a netstack_hold */
2450 2453 };
2451 2454
2452 2455 /*
2453 2456 * Values for dce_generation.
2454 2457 *
2455 2458 * If a DCE has DCE_GENERATION_CONDEMNED, the last dce_refrele should delete
2456 2459 * it.
2457 2460 *
2458 2461 * DCE_GENERATION_VERIFY is never stored in dce_generation but it is
2459 2462 * stored in places that cache DCE (such as ixa_dce_generation).
2460 2463 * It is used as a signal that the cache is stale and needs to be reverified.
2461 2464 */
2462 2465 #define DCE_GENERATION_CONDEMNED 0
2463 2466 #define DCE_GENERATION_VERIFY 1
2464 2467 #define DCE_GENERATION_INITIAL 2
2465 2468 #define DCE_IS_CONDEMNED(dce) \
2466 2469 ((dce)->dce_generation == DCE_GENERATION_CONDEMNED)
2467 2470
2468 2471
2469 2472 /*
2470 2473 * Values for ips_src_generation.
2471 2474 *
2472 2475 * SRC_GENERATION_VERIFY is never stored in ips_src_generation but it is
2473 2476 * stored in places that cache IREs (ixa_src_generation). It is used as a
2474 2477 * signal that the cache is stale and needs to be reverified.
2475 2478 */
2476 2479 #define SRC_GENERATION_VERIFY 0
2477 2480 #define SRC_GENERATION_INITIAL 1
2478 2481
2479 2482 /*
2480 2483 * The kernel stores security attributes of all gateways in a database made
2481 2484 * up of one or more tsol_gcdb_t elements. Each tsol_gcdb_t contains the
2482 2485 * security-related credentials of the gateway. More than one gateways may
2483 2486 * share entries in the database.
2484 2487 *
2485 2488 * The tsol_gc_t structure represents the gateway to credential association,
2486 2489 * and refers to an entry in the database. One or more tsol_gc_t entities are
2487 2490 * grouped together to form one or more tsol_gcgrp_t, each representing the
2488 2491 * list of security attributes specific to the gateway. A gateway may be
2489 2492 * associated with at most one credentials group.
2490 2493 */
2491 2494 struct tsol_gcgrp_s;
2492 2495
2493 2496 extern uchar_t ip6opt_ls; /* TX IPv6 enabler */
2494 2497
2495 2498 /*
2496 2499 * Gateway security credential record.
2497 2500 */
2498 2501 typedef struct tsol_gcdb_s {
2499 2502 uint_t gcdb_refcnt; /* reference count */
2500 2503 struct rtsa_s gcdb_attr; /* security attributes */
2501 2504 #define gcdb_mask gcdb_attr.rtsa_mask
2502 2505 #define gcdb_doi gcdb_attr.rtsa_doi
2503 2506 #define gcdb_slrange gcdb_attr.rtsa_slrange
2504 2507 } tsol_gcdb_t;
2505 2508
2506 2509 /*
2507 2510 * Gateway to credential association.
2508 2511 */
2509 2512 typedef struct tsol_gc_s {
2510 2513 uint_t gc_refcnt; /* reference count */
2511 2514 struct tsol_gcgrp_s *gc_grp; /* pointer to group */
2512 2515 struct tsol_gc_s *gc_prev; /* previous in list */
2513 2516 struct tsol_gc_s *gc_next; /* next in list */
2514 2517 tsol_gcdb_t *gc_db; /* pointer to actual credentials */
2515 2518 } tsol_gc_t;
2516 2519
2517 2520 /*
2518 2521 * Gateway credentials group address.
2519 2522 */
2520 2523 typedef struct tsol_gcgrp_addr_s {
2521 2524 int ga_af; /* address family */
2522 2525 in6_addr_t ga_addr; /* IPv4 mapped or IPv6 address */
2523 2526 } tsol_gcgrp_addr_t;
2524 2527
2525 2528 /*
2526 2529 * Gateway credentials group.
2527 2530 */
2528 2531 typedef struct tsol_gcgrp_s {
2529 2532 uint_t gcgrp_refcnt; /* reference count */
2530 2533 krwlock_t gcgrp_rwlock; /* lock to protect following */
2531 2534 uint_t gcgrp_count; /* number of credentials */
2532 2535 tsol_gc_t *gcgrp_head; /* first credential in list */
2533 2536 tsol_gc_t *gcgrp_tail; /* last credential in list */
2534 2537 tsol_gcgrp_addr_t gcgrp_addr; /* next-hop gateway address */
2535 2538 } tsol_gcgrp_t;
2536 2539
2537 2540 extern kmutex_t gcgrp_lock;
2538 2541
2539 2542 #define GC_REFRELE(p) { \
2540 2543 ASSERT((p)->gc_grp != NULL); \
2541 2544 rw_enter(&(p)->gc_grp->gcgrp_rwlock, RW_WRITER); \
2542 2545 ASSERT((p)->gc_refcnt > 0); \
2543 2546 if (--((p)->gc_refcnt) == 0) \
2544 2547 gc_inactive(p); \
2545 2548 else \
2546 2549 rw_exit(&(p)->gc_grp->gcgrp_rwlock); \
2547 2550 }
2548 2551
2549 2552 #define GCGRP_REFHOLD(p) { \
2550 2553 mutex_enter(&gcgrp_lock); \
2551 2554 ++((p)->gcgrp_refcnt); \
2552 2555 ASSERT((p)->gcgrp_refcnt != 0); \
2553 2556 mutex_exit(&gcgrp_lock); \
2554 2557 }
2555 2558
2556 2559 #define GCGRP_REFRELE(p) { \
2557 2560 mutex_enter(&gcgrp_lock); \
2558 2561 ASSERT((p)->gcgrp_refcnt > 0); \
2559 2562 if (--((p)->gcgrp_refcnt) == 0) \
2560 2563 gcgrp_inactive(p); \
2561 2564 ASSERT(MUTEX_HELD(&gcgrp_lock)); \
2562 2565 mutex_exit(&gcgrp_lock); \
2563 2566 }
2564 2567
2565 2568 /*
2566 2569 * IRE gateway security attributes structure, pointed to by tsol_ire_gw_secattr
2567 2570 */
2568 2571 struct tsol_tnrhc;
2569 2572
2570 2573 struct tsol_ire_gw_secattr_s {
2571 2574 kmutex_t igsa_lock; /* lock to protect following */
2572 2575 struct tsol_tnrhc *igsa_rhc; /* host entry for gateway */
2573 2576 tsol_gc_t *igsa_gc; /* for prefix IREs */
2574 2577 };
2575 2578
2576 2579 void irb_refrele_ftable(irb_t *);
2577 2580
2578 2581 extern struct kmem_cache *rt_entry_cache;
2579 2582
2580 2583 typedef struct ire4 {
2581 2584 ipaddr_t ire4_mask; /* Mask for matching this IRE. */
2582 2585 ipaddr_t ire4_addr; /* Address this IRE represents. */
2583 2586 ipaddr_t ire4_gateway_addr; /* Gateway including for IRE_ONLINK */
2584 2587 ipaddr_t ire4_setsrc_addr; /* RTF_SETSRC */
2585 2588 } ire4_t;
2586 2589
2587 2590 typedef struct ire6 {
2588 2591 in6_addr_t ire6_mask; /* Mask for matching this IRE. */
2589 2592 in6_addr_t ire6_addr; /* Address this IRE represents. */
2590 2593 in6_addr_t ire6_gateway_addr; /* Gateway including for IRE_ONLINK */
2591 2594 in6_addr_t ire6_setsrc_addr; /* RTF_SETSRC */
2592 2595 } ire6_t;
2593 2596
2594 2597 typedef union ire_addr {
2595 2598 ire6_t ire6_u;
2596 2599 ire4_t ire4_u;
2597 2600 } ire_addr_u_t;
2598 2601
2599 2602 /*
2600 2603 * Internet Routing Entry
2601 2604 * When we have multiple identical IREs we logically add them by manipulating
2602 2605 * ire_identical_ref and ire_delete first decrements
2603 2606 * that and when it reaches 1 we know it is the last IRE.
2604 2607 * "identical" is defined as being the same for:
2605 2608 * ire_addr, ire_netmask, ire_gateway, ire_ill, ire_zoneid, and ire_type
2606 2609 * For instance, multiple IRE_BROADCASTs for the same subnet number are
2607 2610 * viewed as identical, and so are the IRE_INTERFACEs when there are
2608 2611 * multiple logical interfaces (on the same ill) with the same subnet prefix.
2609 2612 */
2610 2613 struct ire_s {
2611 2614 struct ire_s *ire_next; /* The hash chain must be first. */
2612 2615 struct ire_s **ire_ptpn; /* Pointer to previous next. */
2613 2616 uint32_t ire_refcnt; /* Number of references */
2614 2617 ill_t *ire_ill;
2615 2618 uint32_t ire_identical_ref; /* IRE_INTERFACE, IRE_BROADCAST */
2616 2619 uchar_t ire_ipversion; /* IPv4/IPv6 version */
2617 2620 ushort_t ire_type; /* Type of IRE */
2618 2621 uint_t ire_generation; /* Generation including CONDEMNED */
2619 2622 uint_t ire_ib_pkt_count; /* Inbound packets for ire_addr */
2620 2623 uint_t ire_ob_pkt_count; /* Outbound packets to ire_addr */
2621 2624 time_t ire_create_time; /* Time (in secs) IRE was created. */
2622 2625 uint32_t ire_flags; /* flags related to route (RTF_*) */
2623 2626 /*
2624 2627 * ire_testhidden is TRUE for INTERFACE IREs of IS_UNDER_IPMP(ill)
2625 2628 * interfaces
2626 2629 */
2627 2630 boolean_t ire_testhidden;
2628 2631 pfirerecv_t ire_recvfn; /* Receive side handling */
2629 2632 pfiresend_t ire_sendfn; /* Send side handling */
2630 2633 pfirepostfrag_t ire_postfragfn; /* Bottom end of send handling */
2631 2634
2632 2635 uint_t ire_masklen; /* # bits in ire_mask{,_v6} */
2633 2636 ire_addr_u_t ire_u; /* IPv4/IPv6 address info. */
2634 2637
2635 2638 irb_t *ire_bucket; /* Hash bucket when ire_ptphn is set */
2636 2639 kmutex_t ire_lock;
2637 2640 clock_t ire_last_used_time; /* For IRE_LOCAL reception */
2638 2641 tsol_ire_gw_secattr_t *ire_gw_secattr; /* gateway security attributes */
2639 2642 zoneid_t ire_zoneid;
2640 2643
2641 2644 /*
2642 2645 * Cached information of where to send packets that match this route.
2643 2646 * The ire_dep_* information is used to determine when ire_nce_cache
2644 2647 * needs to be updated.
2645 2648 * ire_nce_cache is the fastpath for the Neighbor Cache Entry
2646 2649 * for IPv6; arp info for IPv4
2647 2650 * Since this is a cache setup and torn down independently of
2648 2651 * applications we need to use nce_ref{rele,hold}_notr for it.
2649 2652 */
2650 2653 nce_t *ire_nce_cache;
2651 2654
2652 2655 /*
2653 2656 * Quick check whether the ire_type and ire_masklen indicates
2654 2657 * that the IRE can have ire_nce_cache set i.e., whether it is
2655 2658 * IRE_ONLINK and for a single destination.
2656 2659 */
2657 2660 boolean_t ire_nce_capable;
2658 2661
2659 2662 /*
2660 2663 * Dependency tracking so we can safely cache IRE and NCE pointers
2661 2664 * in offlink and onlink IREs.
2662 2665 * These are locked under the ips_ire_dep_lock rwlock. Write held
2663 2666 * when modifying the linkage.
2664 2667 * ire_dep_parent (Also chain towards IRE for nexthop)
2665 2668 * ire_dep_parent_generation: ire_generation of ire_dep_parent
2666 2669 * ire_dep_children (From parent to first child)
2667 2670 * ire_dep_sib_next (linked list of siblings)
2668 2671 * ire_dep_sib_ptpn (linked list of siblings)
2669 2672 *
2670 2673 * The parent has a ire_refhold on each child, and each child has
2671 2674 * an ire_refhold on its parent.
2672 2675 * Since ire_dep_parent is a cache setup and torn down independently of
2673 2676 * applications we need to use ire_ref{rele,hold}_notr for it.
2674 2677 */
2675 2678 ire_t *ire_dep_parent;
2676 2679 ire_t *ire_dep_children;
2677 2680 ire_t *ire_dep_sib_next;
2678 2681 ire_t **ire_dep_sib_ptpn; /* Pointer to previous next */
2679 2682 uint_t ire_dep_parent_generation;
2680 2683
2681 2684 uint_t ire_badcnt; /* Number of times ND_UNREACHABLE */
2682 2685 uint64_t ire_last_badcnt; /* In seconds */
2683 2686
2684 2687 /* ire_defense* and ire_last_used_time are only used on IRE_LOCALs */
2685 2688 uint_t ire_defense_count; /* number of ARP conflicts */
2686 2689 uint_t ire_defense_time; /* last time defended (secs) */
2687 2690
2688 2691 boolean_t ire_trace_disable; /* True when alloc fails */
2689 2692 ip_stack_t *ire_ipst; /* Does not have a netstack_hold */
2690 2693 iulp_t ire_metrics;
2691 2694 /*
2692 2695 * default and prefix routes that are added without explicitly
2693 2696 * specifying the interface are termed "unbound" routes, and will
2694 2697 * have ire_unbound set to true.
2695 2698 */
2696 2699 boolean_t ire_unbound;
2697 2700 };
2698 2701
2699 2702 /* IPv4 compatibility macros */
2700 2703 #define ire_mask ire_u.ire4_u.ire4_mask
2701 2704 #define ire_addr ire_u.ire4_u.ire4_addr
2702 2705 #define ire_gateway_addr ire_u.ire4_u.ire4_gateway_addr
2703 2706 #define ire_setsrc_addr ire_u.ire4_u.ire4_setsrc_addr
2704 2707
2705 2708 #define ire_mask_v6 ire_u.ire6_u.ire6_mask
2706 2709 #define ire_addr_v6 ire_u.ire6_u.ire6_addr
2707 2710 #define ire_gateway_addr_v6 ire_u.ire6_u.ire6_gateway_addr
2708 2711 #define ire_setsrc_addr_v6 ire_u.ire6_u.ire6_setsrc_addr
2709 2712
2710 2713 /*
2711 2714 * Values for ire_generation.
2712 2715 *
2713 2716 * If an IRE is marked with IRE_IS_CONDEMNED, the last walker of
2714 2717 * the bucket should delete this IRE from this bucket.
2715 2718 *
2716 2719 * IRE_GENERATION_VERIFY is never stored in ire_generation but it is
2717 2720 * stored in places that cache IREs (such as ixa_ire_generation and
2718 2721 * ire_dep_parent_generation). It is used as a signal that the cache is
2719 2722 * stale and needs to be reverified.
2720 2723 */
2721 2724 #define IRE_GENERATION_CONDEMNED 0
2722 2725 #define IRE_GENERATION_VERIFY 1
2723 2726 #define IRE_GENERATION_INITIAL 2
2724 2727 #define IRE_IS_CONDEMNED(ire) \
2725 2728 ((ire)->ire_generation == IRE_GENERATION_CONDEMNED)
2726 2729
2727 2730 /* Convenient typedefs for sockaddrs */
2728 2731 typedef struct sockaddr_in sin_t;
2729 2732 typedef struct sockaddr_in6 sin6_t;
2730 2733
2731 2734 /* Name/Value Descriptor. */
2732 2735 typedef struct nv_s {
2733 2736 uint64_t nv_value;
2734 2737 char *nv_name;
2735 2738 } nv_t;
2736 2739
2737 2740 #define ILL_FRAG_HASH(s, i) \
2738 2741 ((ntohl(s) ^ ((i) ^ ((i) >> 8))) % ILL_FRAG_HASH_TBL_COUNT)
2739 2742
2740 2743 /*
2741 2744 * The MAX number of allowed fragmented packets per hash bucket
2742 2745 * calculation is based on the most common mtu size of 1500. This limit
2743 2746 * will work well for other mtu sizes as well.
2744 2747 */
2745 2748 #define COMMON_IP_MTU 1500
2746 2749 #define MAX_FRAG_MIN 10
2747 2750 #define MAX_FRAG_PKTS(ipst) \
2748 2751 MAX(MAX_FRAG_MIN, (2 * (ipst->ips_ip_reass_queue_bytes / \
2749 2752 (COMMON_IP_MTU * ILL_FRAG_HASH_TBL_COUNT))))
2750 2753
2751 2754 /*
2752 2755 * Maximum dups allowed per packet.
2753 2756 */
2754 2757 extern uint_t ip_max_frag_dups;
2755 2758
2756 2759 /*
2757 2760 * Per-packet information for received packets and transmitted.
2758 2761 * Used by the transport protocols when converting between the packet
2759 2762 * and ancillary data and socket options.
2760 2763 *
2761 2764 * Note: This private data structure and related IPPF_* constant
2762 2765 * definitions are exposed to enable compilation of some debugging tools
2763 2766 * like lsof which use struct tcp_t in <inet/tcp.h>. This is intended to be
2764 2767 * a temporary hack and long term alternate interfaces should be defined
2765 2768 * to support the needs of such tools and private definitions moved to
2766 2769 * private headers.
2767 2770 */
2768 2771 struct ip_pkt_s {
2769 2772 uint_t ipp_fields; /* Which fields are valid */
2770 2773 in6_addr_t ipp_addr; /* pktinfo src/dst addr */
2771 2774 #define ipp_addr_v4 V4_PART_OF_V6(ipp_addr)
2772 2775 uint_t ipp_unicast_hops; /* IPV6_UNICAST_HOPS, IP_TTL */
2773 2776 uint_t ipp_hoplimit; /* IPV6_HOPLIMIT */
2774 2777 uint_t ipp_hopoptslen;
2775 2778 uint_t ipp_rthdrdstoptslen;
2776 2779 uint_t ipp_rthdrlen;
2777 2780 uint_t ipp_dstoptslen;
2778 2781 uint_t ipp_fraghdrlen;
2779 2782 ip6_hbh_t *ipp_hopopts;
2780 2783 ip6_dest_t *ipp_rthdrdstopts;
2781 2784 ip6_rthdr_t *ipp_rthdr;
2782 2785 ip6_dest_t *ipp_dstopts;
2783 2786 ip6_frag_t *ipp_fraghdr;
2784 2787 uint8_t ipp_tclass; /* IPV6_TCLASS */
2785 2788 uint8_t ipp_type_of_service; /* IP_TOS */
2786 2789 uint_t ipp_ipv4_options_len; /* Len of IPv4 options */
2787 2790 uint8_t *ipp_ipv4_options; /* Ptr to IPv4 options */
2788 2791 uint_t ipp_label_len_v4; /* Len of TX label for IPv4 */
2789 2792 uint8_t *ipp_label_v4; /* TX label for IPv4 */
2790 2793 uint_t ipp_label_len_v6; /* Len of TX label for IPv6 */
2791 2794 uint8_t *ipp_label_v6; /* TX label for IPv6 */
2792 2795 };
2793 2796 typedef struct ip_pkt_s ip_pkt_t;
2794 2797
2795 2798 extern void ip_pkt_free(ip_pkt_t *); /* free storage inside ip_pkt_t */
2796 2799 extern ipaddr_t ip_pkt_source_route_v4(const ip_pkt_t *);
2797 2800 extern in6_addr_t *ip_pkt_source_route_v6(const ip_pkt_t *);
2798 2801 extern int ip_pkt_copy(ip_pkt_t *, ip_pkt_t *, int);
2799 2802 extern void ip_pkt_source_route_reverse_v4(ip_pkt_t *);
2800 2803
2801 2804 /* ipp_fields values */
2802 2805 #define IPPF_ADDR 0x0001 /* Part of in6_pktinfo: src/dst addr */
2803 2806 #define IPPF_HOPLIMIT 0x0002 /* Overrides unicast and multicast */
2804 2807 #define IPPF_TCLASS 0x0004 /* Overrides class in sin6_flowinfo */
2805 2808
2806 2809 #define IPPF_HOPOPTS 0x0010 /* ipp_hopopts set */
2807 2810 #define IPPF_RTHDR 0x0020 /* ipp_rthdr set */
2808 2811 #define IPPF_RTHDRDSTOPTS 0x0040 /* ipp_rthdrdstopts set */
2809 2812 #define IPPF_DSTOPTS 0x0080 /* ipp_dstopts set */
2810 2813
2811 2814 #define IPPF_IPV4_OPTIONS 0x0100 /* ipp_ipv4_options set */
2812 2815 #define IPPF_LABEL_V4 0x0200 /* ipp_label_v4 set */
2813 2816 #define IPPF_LABEL_V6 0x0400 /* ipp_label_v6 set */
2814 2817
2815 2818 #define IPPF_FRAGHDR 0x0800 /* Used for IPsec receive side */
2816 2819
2817 2820 /*
2818 2821 * Data structure which is passed to conn_opt_get/set.
2819 2822 * The conn_t is included even though it can be inferred from queue_t.
2820 2823 * setsockopt and getsockopt use conn_ixa and conn_xmit_ipp. However,
2821 2824 * when handling ancillary data we use separate ixa and ipps.
2822 2825 */
2823 2826 typedef struct conn_opt_arg_s {
2824 2827 conn_t *coa_connp;
2825 2828 ip_xmit_attr_t *coa_ixa;
2826 2829 ip_pkt_t *coa_ipp;
2827 2830 boolean_t coa_ancillary; /* Ancillary data and not setsockopt */
2828 2831 uint_t coa_changed; /* See below */
2829 2832 } conn_opt_arg_t;
2830 2833
2831 2834 /*
2832 2835 * Flags for what changed.
2833 2836 * If we want to be more efficient in the future we can have more fine
2834 2837 * grained flags e.g., a flag for just IP_TOS changing.
2835 2838 * For now we either call ip_set_destination (for "route changed")
2836 2839 * and/or conn_build_hdr_template/conn_prepend_hdr (for "header changed").
2837 2840 */
2838 2841 #define COA_HEADER_CHANGED 0x0001
2839 2842 #define COA_ROUTE_CHANGED 0x0002
2840 2843 #define COA_RCVBUF_CHANGED 0x0004 /* SO_RCVBUF */
2841 2844 #define COA_SNDBUF_CHANGED 0x0008 /* SO_SNDBUF */
2842 2845 #define COA_WROFF_CHANGED 0x0010 /* Header size changed */
2843 2846 #define COA_ICMP_BIND_NEEDED 0x0020
2844 2847 #define COA_OOBINLINE_CHANGED 0x0040
2845 2848
2846 2849 #define TCP_PORTS_OFFSET 0
2847 2850 #define UDP_PORTS_OFFSET 0
2848 2851
2849 2852 /*
2850 2853 * lookups return the ill/ipif only if the flags are clear OR Iam writer.
2851 2854 * ill / ipif lookup functions increment the refcnt on the ill / ipif only
2852 2855 * after calling these macros. This ensures that the refcnt on the ipif or
2853 2856 * ill will eventually drop down to zero.
2854 2857 */
2855 2858 #define ILL_LOOKUP_FAILED 1 /* Used as error code */
2856 2859 #define IPIF_LOOKUP_FAILED 2 /* Used as error code */
2857 2860
2858 2861 #define ILL_CAN_LOOKUP(ill) \
2859 2862 (!((ill)->ill_state_flags & ILL_CONDEMNED) || \
2860 2863 IAM_WRITER_ILL(ill))
2861 2864
2862 2865 #define ILL_IS_CONDEMNED(ill) \
2863 2866 ((ill)->ill_state_flags & ILL_CONDEMNED)
2864 2867
2865 2868 #define IPIF_CAN_LOOKUP(ipif) \
2866 2869 (!((ipif)->ipif_state_flags & IPIF_CONDEMNED) || \
2867 2870 IAM_WRITER_IPIF(ipif))
2868 2871
2869 2872 #define IPIF_IS_CONDEMNED(ipif) \
2870 2873 ((ipif)->ipif_state_flags & IPIF_CONDEMNED)
2871 2874
2872 2875 #define IPIF_IS_CHANGING(ipif) \
2873 2876 ((ipif)->ipif_state_flags & IPIF_CHANGING)
2874 2877
2875 2878 /* Macros used to assert that this thread is a writer */
2876 2879 #define IAM_WRITER_IPSQ(ipsq) ((ipsq)->ipsq_xop->ipx_writer == curthread)
2877 2880 #define IAM_WRITER_ILL(ill) IAM_WRITER_IPSQ((ill)->ill_phyint->phyint_ipsq)
2878 2881 #define IAM_WRITER_IPIF(ipif) IAM_WRITER_ILL((ipif)->ipif_ill)
2879 2882
2880 2883 /*
2881 2884 * Grab ill locks in the proper order. The order is highest addressed
2882 2885 * ill is locked first.
2883 2886 */
2884 2887 #define GRAB_ILL_LOCKS(ill_1, ill_2) \
2885 2888 { \
2886 2889 if ((ill_1) > (ill_2)) { \
2887 2890 if (ill_1 != NULL) \
2888 2891 mutex_enter(&(ill_1)->ill_lock); \
2889 2892 if (ill_2 != NULL) \
2890 2893 mutex_enter(&(ill_2)->ill_lock); \
2891 2894 } else { \
2892 2895 if (ill_2 != NULL) \
2893 2896 mutex_enter(&(ill_2)->ill_lock); \
2894 2897 if (ill_1 != NULL && ill_1 != ill_2) \
2895 2898 mutex_enter(&(ill_1)->ill_lock); \
2896 2899 } \
2897 2900 }
2898 2901
2899 2902 #define RELEASE_ILL_LOCKS(ill_1, ill_2) \
2900 2903 { \
2901 2904 if (ill_1 != NULL) \
2902 2905 mutex_exit(&(ill_1)->ill_lock); \
2903 2906 if (ill_2 != NULL && ill_2 != ill_1) \
2904 2907 mutex_exit(&(ill_2)->ill_lock); \
2905 2908 }
2906 2909
2907 2910 /* Get the other protocol instance ill */
2908 2911 #define ILL_OTHER(ill) \
2909 2912 ((ill)->ill_isv6 ? (ill)->ill_phyint->phyint_illv4 : \
2910 2913 (ill)->ill_phyint->phyint_illv6)
2911 2914
2912 2915 /* ioctl command info: Ioctl properties extracted and stored in here */
2913 2916 typedef struct cmd_info_s
2914 2917 {
2915 2918 ipif_t *ci_ipif; /* ipif associated with [l]ifreq ioctl's */
2916 2919 sin_t *ci_sin; /* the sin struct passed down */
2917 2920 sin6_t *ci_sin6; /* the sin6_t struct passed down */
2918 2921 struct lifreq *ci_lifr; /* the lifreq struct passed down */
2919 2922 } cmd_info_t;
2920 2923
2921 2924 extern struct kmem_cache *ire_cache;
2922 2925
2923 2926 extern ipaddr_t ip_g_all_ones;
2924 2927
2925 2928 extern uint_t ip_loopback_mtu; /* /etc/system */
2926 2929 extern uint_t ip_loopback_mtuplus;
2927 2930 extern uint_t ip_loopback_mtu_v6plus;
2928 2931
2929 2932 extern vmem_t *ip_minor_arena_sa;
2930 2933 extern vmem_t *ip_minor_arena_la;
2931 2934
2932 2935 /*
2933 2936 * ip_g_forward controls IP forwarding. It takes two values:
2934 2937 * 0: IP_FORWARD_NEVER Don't forward packets ever.
2935 2938 * 1: IP_FORWARD_ALWAYS Forward packets for elsewhere.
2936 2939 *
2937 2940 * RFC1122 says there must be a configuration switch to control forwarding,
2938 2941 * but that the default MUST be to not forward packets ever. Implicit
2939 2942 * control based on configuration of multiple interfaces MUST NOT be
2940 2943 * implemented (Section 3.1). SunOS 4.1 did provide the "automatic" capability
2941 2944 * and, in fact, it was the default. That capability is now provided in the
2942 2945 * /etc/rc2.d/S69inet script.
2943 2946 */
2944 2947
2945 2948 #define ips_ip_respond_to_address_mask_broadcast \
2946 2949 ips_propinfo_tbl[0].prop_cur_bval
2947 2950 #define ips_ip_g_resp_to_echo_bcast ips_propinfo_tbl[1].prop_cur_bval
2948 2951 #define ips_ip_g_resp_to_echo_mcast ips_propinfo_tbl[2].prop_cur_bval
2949 2952 #define ips_ip_g_resp_to_timestamp ips_propinfo_tbl[3].prop_cur_bval
2950 2953 #define ips_ip_g_resp_to_timestamp_bcast ips_propinfo_tbl[4].prop_cur_bval
2951 2954 #define ips_ip_g_send_redirects ips_propinfo_tbl[5].prop_cur_bval
2952 2955 #define ips_ip_g_forward_directed_bcast ips_propinfo_tbl[6].prop_cur_bval
2953 2956 #define ips_ip_mrtdebug ips_propinfo_tbl[7].prop_cur_uval
2954 2957 #define ips_ip_ire_reclaim_fraction ips_propinfo_tbl[8].prop_cur_uval
2955 2958 #define ips_ip_nce_reclaim_fraction ips_propinfo_tbl[9].prop_cur_uval
2956 2959 #define ips_ip_dce_reclaim_fraction ips_propinfo_tbl[10].prop_cur_uval
2957 2960 #define ips_ip_def_ttl ips_propinfo_tbl[11].prop_cur_uval
2958 2961 #define ips_ip_forward_src_routed ips_propinfo_tbl[12].prop_cur_bval
2959 2962 #define ips_ip_wroff_extra ips_propinfo_tbl[13].prop_cur_uval
2960 2963 #define ips_ip_pathmtu_interval ips_propinfo_tbl[14].prop_cur_uval
2961 2964 #define ips_ip_icmp_return ips_propinfo_tbl[15].prop_cur_uval
2962 2965 #define ips_ip_path_mtu_discovery ips_propinfo_tbl[16].prop_cur_bval
2963 2966 #define ips_ip_pmtu_min ips_propinfo_tbl[17].prop_cur_uval
2964 2967 #define ips_ip_ignore_redirect ips_propinfo_tbl[18].prop_cur_bval
2965 2968 #define ips_ip_arp_icmp_error ips_propinfo_tbl[19].prop_cur_bval
2966 2969 #define ips_ip_broadcast_ttl ips_propinfo_tbl[20].prop_cur_uval
2967 2970 #define ips_ip_icmp_err_interval ips_propinfo_tbl[21].prop_cur_uval
2968 2971 #define ips_ip_icmp_err_burst ips_propinfo_tbl[22].prop_cur_uval
2969 2972 #define ips_ip_reass_queue_bytes ips_propinfo_tbl[23].prop_cur_uval
2970 2973 #define ips_ip_strict_dst_multihoming ips_propinfo_tbl[24].prop_cur_uval
2971 2974 #define ips_ip_addrs_per_if ips_propinfo_tbl[25].prop_cur_uval
2972 2975 #define ips_ipsec_override_persocket_policy ips_propinfo_tbl[26].prop_cur_bval
2973 2976 #define ips_icmp_accept_clear_messages ips_propinfo_tbl[27].prop_cur_bval
2974 2977 #define ips_igmp_accept_clear_messages ips_propinfo_tbl[28].prop_cur_bval
2975 2978
2976 2979 /* IPv6 configuration knobs */
2977 2980 #define ips_delay_first_probe_time ips_propinfo_tbl[29].prop_cur_uval
2978 2981 #define ips_max_unicast_solicit ips_propinfo_tbl[30].prop_cur_uval
2979 2982 #define ips_ipv6_def_hops ips_propinfo_tbl[31].prop_cur_uval
2980 2983 #define ips_ipv6_icmp_return ips_propinfo_tbl[32].prop_cur_uval
2981 2984 #define ips_ipv6_forward_src_routed ips_propinfo_tbl[33].prop_cur_bval
2982 2985 #define ips_ipv6_resp_echo_mcast ips_propinfo_tbl[34].prop_cur_bval
2983 2986 #define ips_ipv6_send_redirects ips_propinfo_tbl[35].prop_cur_bval
2984 2987 #define ips_ipv6_ignore_redirect ips_propinfo_tbl[36].prop_cur_bval
2985 2988 #define ips_ipv6_strict_dst_multihoming ips_propinfo_tbl[37].prop_cur_uval
2986 2989 #define ips_src_check ips_propinfo_tbl[38].prop_cur_uval
2987 2990 #define ips_ipsec_policy_log_interval ips_propinfo_tbl[39].prop_cur_uval
2988 2991 #define ips_pim_accept_clear_messages ips_propinfo_tbl[40].prop_cur_bval
2989 2992 #define ips_ip_ndp_unsolicit_interval ips_propinfo_tbl[41].prop_cur_uval
2990 2993 #define ips_ip_ndp_unsolicit_count ips_propinfo_tbl[42].prop_cur_uval
2991 2994 #define ips_ipv6_ignore_home_address_opt ips_propinfo_tbl[43].prop_cur_bval
2992 2995
2993 2996 /* Misc IP configuration knobs */
2994 2997 #define ips_ip_policy_mask ips_propinfo_tbl[44].prop_cur_uval
2995 2998 #define ips_ip_ecmp_behavior ips_propinfo_tbl[45].prop_cur_uval
2996 2999 #define ips_ip_multirt_ttl ips_propinfo_tbl[46].prop_cur_uval
2997 3000 #define ips_ip_ire_badcnt_lifetime ips_propinfo_tbl[47].prop_cur_uval
2998 3001 #define ips_ip_max_temp_idle ips_propinfo_tbl[48].prop_cur_uval
2999 3002 #define ips_ip_max_temp_defend ips_propinfo_tbl[49].prop_cur_uval
3000 3003 #define ips_ip_max_defend ips_propinfo_tbl[50].prop_cur_uval
3001 3004 #define ips_ip_defend_interval ips_propinfo_tbl[51].prop_cur_uval
3002 3005 #define ips_ip_dup_recovery ips_propinfo_tbl[52].prop_cur_uval
3003 3006 #define ips_ip_restrict_interzone_loopback ips_propinfo_tbl[53].prop_cur_bval
3004 3007 #define ips_ip_lso_outbound ips_propinfo_tbl[54].prop_cur_bval
3005 3008 #define ips_igmp_max_version ips_propinfo_tbl[55].prop_cur_uval
3006 3009 #define ips_mld_max_version ips_propinfo_tbl[56].prop_cur_uval
3007 3010 #define ips_ip_forwarding ips_propinfo_tbl[57].prop_cur_bval
3008 3011 #define ips_ipv6_forwarding ips_propinfo_tbl[58].prop_cur_bval
3009 3012 #define ips_ip_reassembly_timeout ips_propinfo_tbl[59].prop_cur_uval
3010 3013 #define ips_ipv6_reassembly_timeout ips_propinfo_tbl[60].prop_cur_uval
3011 3014 #define ips_ip_cgtp_filter ips_propinfo_tbl[61].prop_cur_bval
3012 3015 #define ips_arp_probe_delay ips_propinfo_tbl[62].prop_cur_uval
3013 3016 #define ips_arp_fastprobe_delay ips_propinfo_tbl[63].prop_cur_uval
3014 3017 #define ips_arp_probe_interval ips_propinfo_tbl[64].prop_cur_uval
3015 3018 #define ips_arp_fastprobe_interval ips_propinfo_tbl[65].prop_cur_uval
3016 3019 #define ips_arp_probe_count ips_propinfo_tbl[66].prop_cur_uval
3017 3020 #define ips_arp_fastprobe_count ips_propinfo_tbl[67].prop_cur_uval
3018 3021 #define ips_ipv4_dad_announce_interval ips_propinfo_tbl[68].prop_cur_uval
3019 3022 #define ips_ipv6_dad_announce_interval ips_propinfo_tbl[69].prop_cur_uval
3020 3023 #define ips_arp_defend_interval ips_propinfo_tbl[70].prop_cur_uval
3021 3024 #define ips_arp_defend_rate ips_propinfo_tbl[71].prop_cur_uval
3022 3025 #define ips_ndp_defend_interval ips_propinfo_tbl[72].prop_cur_uval
3023 3026 #define ips_ndp_defend_rate ips_propinfo_tbl[73].prop_cur_uval
3024 3027 #define ips_arp_defend_period ips_propinfo_tbl[74].prop_cur_uval
3025 3028 #define ips_ndp_defend_period ips_propinfo_tbl[75].prop_cur_uval
3026 3029 #define ips_ipv4_icmp_return_pmtu ips_propinfo_tbl[76].prop_cur_bval
3027 3030 #define ips_ipv6_icmp_return_pmtu ips_propinfo_tbl[77].prop_cur_bval
3028 3031 #define ips_ip_arp_publish_count ips_propinfo_tbl[78].prop_cur_uval
3029 3032 #define ips_ip_arp_publish_interval ips_propinfo_tbl[79].prop_cur_uval
3030 3033 #define ips_ip_strict_src_multihoming ips_propinfo_tbl[80].prop_cur_uval
3031 3034 #define ips_ipv6_strict_src_multihoming ips_propinfo_tbl[81].prop_cur_uval
3032 3035 #define ips_ipv6_drop_inbound_icmpv6 ips_propinfo_tbl[82].prop_cur_bval
3033 3036
3034 3037 extern int dohwcksum; /* use h/w cksum if supported by the h/w */
3035 3038 #ifdef ZC_TEST
3036 3039 extern int noswcksum;
3037 3040 #endif
3038 3041
3039 3042 extern char ipif_loopback_name[];
3040 3043
3041 3044 extern nv_t *ire_nv_tbl;
3042 3045
3043 3046 extern struct module_info ip_mod_info;
3044 3047
3045 3048 #define HOOKS4_INTERESTED_PHYSICAL_IN(ipst) \
3046 3049 ((ipst)->ips_ip4_physical_in_event.he_interested)
3047 3050 #define HOOKS6_INTERESTED_PHYSICAL_IN(ipst) \
3048 3051 ((ipst)->ips_ip6_physical_in_event.he_interested)
3049 3052 #define HOOKS4_INTERESTED_PHYSICAL_OUT(ipst) \
3050 3053 ((ipst)->ips_ip4_physical_out_event.he_interested)
3051 3054 #define HOOKS6_INTERESTED_PHYSICAL_OUT(ipst) \
3052 3055 ((ipst)->ips_ip6_physical_out_event.he_interested)
3053 3056 #define HOOKS4_INTERESTED_FORWARDING(ipst) \
3054 3057 ((ipst)->ips_ip4_forwarding_event.he_interested)
3055 3058 #define HOOKS6_INTERESTED_FORWARDING(ipst) \
3056 3059 ((ipst)->ips_ip6_forwarding_event.he_interested)
3057 3060 #define HOOKS4_INTERESTED_LOOPBACK_IN(ipst) \
3058 3061 ((ipst)->ips_ip4_loopback_in_event.he_interested)
3059 3062 #define HOOKS6_INTERESTED_LOOPBACK_IN(ipst) \
3060 3063 ((ipst)->ips_ip6_loopback_in_event.he_interested)
3061 3064 #define HOOKS4_INTERESTED_LOOPBACK_OUT(ipst) \
3062 3065 ((ipst)->ips_ip4_loopback_out_event.he_interested)
3063 3066 #define HOOKS6_INTERESTED_LOOPBACK_OUT(ipst) \
3064 3067 ((ipst)->ips_ip6_loopback_out_event.he_interested)
3065 3068 /*
3066 3069 * Hooks marcos used inside of ip
3067 3070 * The callers use the above INTERESTED macros first, hence
3068 3071 * the he_interested check is superflous.
3069 3072 */
3070 3073 #define FW_HOOKS(_hook, _event, _ilp, _olp, _iph, _fm, _m, _llm, ipst, _err) \
3071 3074 if ((_hook).he_interested) { \
3072 3075 hook_pkt_event_t info; \
3073 3076 \
3074 3077 _NOTE(CONSTCOND) \
3075 3078 ASSERT((_ilp != NULL) || (_olp != NULL)); \
3076 3079 \
3077 3080 FW_SET_ILL_INDEX(info.hpe_ifp, (ill_t *)_ilp); \
3078 3081 FW_SET_ILL_INDEX(info.hpe_ofp, (ill_t *)_olp); \
3079 3082 info.hpe_protocol = ipst->ips_ipv4_net_data; \
3080 3083 info.hpe_hdr = _iph; \
3081 3084 info.hpe_mp = &(_fm); \
3082 3085 info.hpe_mb = _m; \
3083 3086 info.hpe_flags = _llm; \
3084 3087 _err = hook_run(ipst->ips_ipv4_net_data->netd_hooks, \
3085 3088 _event, (hook_data_t)&info); \
3086 3089 if (_err != 0) { \
3087 3090 ip2dbg(("%s hook dropped mblk chain %p hdr %p\n",\
3088 3091 (_hook).he_name, (void *)_fm, (void *)_m)); \
3089 3092 if (_fm != NULL) { \
3090 3093 freemsg(_fm); \
3091 3094 _fm = NULL; \
3092 3095 } \
3093 3096 _iph = NULL; \
3094 3097 _m = NULL; \
3095 3098 } else { \
3096 3099 _iph = info.hpe_hdr; \
3097 3100 _m = info.hpe_mb; \
3098 3101 } \
3099 3102 }
3100 3103
3101 3104 #define FW_HOOKS6(_hook, _event, _ilp, _olp, _iph, _fm, _m, _llm, ipst, _err) \
3102 3105 if ((_hook).he_interested) { \
3103 3106 hook_pkt_event_t info; \
3104 3107 \
3105 3108 _NOTE(CONSTCOND) \
3106 3109 ASSERT((_ilp != NULL) || (_olp != NULL)); \
3107 3110 \
3108 3111 FW_SET_ILL_INDEX(info.hpe_ifp, (ill_t *)_ilp); \
3109 3112 FW_SET_ILL_INDEX(info.hpe_ofp, (ill_t *)_olp); \
3110 3113 info.hpe_protocol = ipst->ips_ipv6_net_data; \
3111 3114 info.hpe_hdr = _iph; \
3112 3115 info.hpe_mp = &(_fm); \
3113 3116 info.hpe_mb = _m; \
3114 3117 info.hpe_flags = _llm; \
3115 3118 _err = hook_run(ipst->ips_ipv6_net_data->netd_hooks, \
3116 3119 _event, (hook_data_t)&info); \
3117 3120 if (_err != 0) { \
3118 3121 ip2dbg(("%s hook dropped mblk chain %p hdr %p\n",\
3119 3122 (_hook).he_name, (void *)_fm, (void *)_m)); \
3120 3123 if (_fm != NULL) { \
3121 3124 freemsg(_fm); \
3122 3125 _fm = NULL; \
3123 3126 } \
3124 3127 _iph = NULL; \
3125 3128 _m = NULL; \
3126 3129 } else { \
3127 3130 _iph = info.hpe_hdr; \
3128 3131 _m = info.hpe_mb; \
3129 3132 } \
3130 3133 }
3131 3134
3132 3135 #define FW_SET_ILL_INDEX(fp, ill) \
3133 3136 _NOTE(CONSTCOND) \
3134 3137 if ((ill) == NULL || (ill)->ill_phyint == NULL) { \
3135 3138 (fp) = 0; \
3136 3139 _NOTE(CONSTCOND) \
3137 3140 } else if (IS_UNDER_IPMP(ill)) { \
3138 3141 (fp) = ipmp_ill_get_ipmp_ifindex(ill); \
3139 3142 } else { \
3140 3143 (fp) = (ill)->ill_phyint->phyint_ifindex; \
3141 3144 }
3142 3145
3143 3146 /*
3144 3147 * Network byte order macros
3145 3148 */
3146 3149 #ifdef _BIG_ENDIAN
3147 3150 #define N_IN_CLASSA_NET IN_CLASSA_NET
3148 3151 #define N_IN_CLASSD_NET IN_CLASSD_NET
3149 3152 #define N_INADDR_UNSPEC_GROUP INADDR_UNSPEC_GROUP
3150 3153 #define N_IN_LOOPBACK_NET (ipaddr_t)0x7f000000U
3151 3154 #else /* _BIG_ENDIAN */
3152 3155 #define N_IN_CLASSA_NET (ipaddr_t)0x000000ffU
3153 3156 #define N_IN_CLASSD_NET (ipaddr_t)0x000000f0U
3154 3157 #define N_INADDR_UNSPEC_GROUP (ipaddr_t)0x000000e0U
3155 3158 #define N_IN_LOOPBACK_NET (ipaddr_t)0x0000007fU
3156 3159 #endif /* _BIG_ENDIAN */
3157 3160 #define CLASSD(addr) (((addr) & N_IN_CLASSD_NET) == N_INADDR_UNSPEC_GROUP)
3158 3161 #define CLASSE(addr) (((addr) & N_IN_CLASSD_NET) == N_IN_CLASSD_NET)
3159 3162 #define IP_LOOPBACK_ADDR(addr) \
3160 3163 (((addr) & N_IN_CLASSA_NET == N_IN_LOOPBACK_NET))
3161 3164
3162 3165 extern int ip_debug;
3163 3166 extern uint_t ip_thread_data;
3164 3167 extern krwlock_t ip_thread_rwlock;
3165 3168 extern list_t ip_thread_list;
3166 3169
3167 3170 #ifdef IP_DEBUG
3168 3171 #include <sys/debug.h>
3169 3172 #include <sys/promif.h>
3170 3173
3171 3174 #define ip0dbg(a) printf a
3172 3175 #define ip1dbg(a) if (ip_debug > 2) printf a
3173 3176 #define ip2dbg(a) if (ip_debug > 3) printf a
3174 3177 #define ip3dbg(a) if (ip_debug > 4) printf a
3175 3178 #else
3176 3179 #define ip0dbg(a) /* */
3177 3180 #define ip1dbg(a) /* */
3178 3181 #define ip2dbg(a) /* */
3179 3182 #define ip3dbg(a) /* */
3180 3183 #endif /* IP_DEBUG */
3181 3184
3182 3185 /* Default MAC-layer address string length for mac_colon_addr */
3183 3186 #define MAC_STR_LEN 128
3184 3187
3185 3188 struct mac_header_info_s;
3186 3189
3187 3190 extern void ill_frag_timer(void *);
3188 3191 extern ill_t *ill_first(int, int, ill_walk_context_t *, ip_stack_t *);
3189 3192 extern ill_t *ill_next(ill_walk_context_t *, ill_t *);
3190 3193 extern void ill_frag_timer_start(ill_t *);
3191 3194 extern void ill_nic_event_dispatch(ill_t *, lif_if_t, nic_event_t,
3192 3195 nic_event_data_t, size_t);
3193 3196 extern mblk_t *ip_carve_mp(mblk_t **, ssize_t);
3194 3197 extern mblk_t *ip_dlpi_alloc(size_t, t_uscalar_t);
3195 3198 extern mblk_t *ip_dlnotify_alloc(uint_t, uint_t);
3196 3199 extern mblk_t *ip_dlnotify_alloc2(uint_t, uint_t, uint_t);
3197 3200 extern char *ip_dot_addr(ipaddr_t, char *);
3198 3201 extern const char *mac_colon_addr(const uint8_t *, size_t, char *, size_t);
3199 3202 extern void ip_lwput(queue_t *, mblk_t *);
3200 3203 extern boolean_t icmp_err_rate_limit(ip_stack_t *);
3201 3204 extern void icmp_frag_needed(mblk_t *, int, ip_recv_attr_t *);
3202 3205 extern mblk_t *icmp_inbound_v4(mblk_t *, ip_recv_attr_t *);
3203 3206 extern void icmp_time_exceeded(mblk_t *, uint8_t, ip_recv_attr_t *);
3204 3207 extern void icmp_unreachable(mblk_t *, uint8_t, ip_recv_attr_t *);
3205 3208 extern boolean_t ip_ipsec_policy_inherit(conn_t *, conn_t *, ip_recv_attr_t *);
3206 3209 extern void *ip_pullup(mblk_t *, ssize_t, ip_recv_attr_t *);
3207 3210 extern void ip_setl2src(mblk_t *, ip_recv_attr_t *, ill_t *);
3208 3211 extern mblk_t *ip_check_and_align_header(mblk_t *, uint_t, ip_recv_attr_t *);
3209 3212 extern mblk_t *ip_check_length(mblk_t *, uchar_t *, ssize_t, uint_t, uint_t,
3210 3213 ip_recv_attr_t *);
3211 3214 extern mblk_t *ip_check_optlen(mblk_t *, ipha_t *, uint_t, uint_t,
3212 3215 ip_recv_attr_t *);
3213 3216 extern mblk_t *ip_fix_dbref(mblk_t *, ip_recv_attr_t *);
3214 3217 extern uint_t ip_cksum(mblk_t *, int, uint32_t);
3215 3218 extern int ip_close(queue_t *, int);
3216 3219 extern uint16_t ip_csum_hdr(ipha_t *);
3217 3220 extern void ip_forward_xmit_v4(nce_t *, ill_t *, mblk_t *, ipha_t *,
3218 3221 ip_recv_attr_t *, uint32_t, uint32_t);
3219 3222 extern boolean_t ip_forward_options(mblk_t *, ipha_t *, ill_t *,
3220 3223 ip_recv_attr_t *);
3221 3224 extern int ip_fragment_v4(mblk_t *, nce_t *, iaflags_t, uint_t, uint32_t,
3222 3225 uint32_t, zoneid_t, zoneid_t, pfirepostfrag_t postfragfn,
3223 3226 uintptr_t *cookie);
3224 3227 extern void ip_proto_not_sup(mblk_t *, ip_recv_attr_t *);
3225 3228 extern void ip_ire_g_fini(void);
3226 3229 extern void ip_ire_g_init(void);
3227 3230 extern void ip_ire_fini(ip_stack_t *);
3228 3231 extern void ip_ire_init(ip_stack_t *);
3229 3232 extern void ip_mdata_to_mhi(ill_t *, mblk_t *, struct mac_header_info_s *);
3230 3233 extern int ip_openv4(queue_t *q, dev_t *devp, int flag, int sflag,
3231 3234 cred_t *credp);
3232 3235 extern int ip_openv6(queue_t *q, dev_t *devp, int flag, int sflag,
3233 3236 cred_t *credp);
3234 3237 extern int ip_reassemble(mblk_t *, ipf_t *, uint_t, boolean_t, ill_t *,
3235 3238 size_t);
3236 3239 extern void ip_rput(queue_t *, mblk_t *);
3237 3240 extern void ip_input(ill_t *, ill_rx_ring_t *, mblk_t *,
3238 3241 struct mac_header_info_s *);
3239 3242 extern void ip_input_v6(ill_t *, ill_rx_ring_t *, mblk_t *,
3240 3243 struct mac_header_info_s *);
3241 3244 extern mblk_t *ip_input_common_v4(ill_t *, ill_rx_ring_t *, mblk_t *,
3242 3245 struct mac_header_info_s *, squeue_t *, mblk_t **, uint_t *);
3243 3246 extern mblk_t *ip_input_common_v6(ill_t *, ill_rx_ring_t *, mblk_t *,
3244 3247 struct mac_header_info_s *, squeue_t *, mblk_t **, uint_t *);
3245 3248 extern void ill_input_full_v4(mblk_t *, void *, void *,
3246 3249 ip_recv_attr_t *, rtc_t *);
3247 3250 extern void ill_input_short_v4(mblk_t *, void *, void *,
3248 3251 ip_recv_attr_t *, rtc_t *);
3249 3252 extern void ill_input_full_v6(mblk_t *, void *, void *,
3250 3253 ip_recv_attr_t *, rtc_t *);
3251 3254 extern void ill_input_short_v6(mblk_t *, void *, void *,
3252 3255 ip_recv_attr_t *, rtc_t *);
3253 3256 extern ipaddr_t ip_input_options(ipha_t *, ipaddr_t, mblk_t *,
3254 3257 ip_recv_attr_t *, int *);
3255 3258 extern boolean_t ip_input_local_options(mblk_t *, ipha_t *, ip_recv_attr_t *);
3256 3259 extern mblk_t *ip_input_fragment(mblk_t *, ipha_t *, ip_recv_attr_t *);
3257 3260 extern mblk_t *ip_input_fragment_v6(mblk_t *, ip6_t *, ip6_frag_t *, uint_t,
3258 3261 ip_recv_attr_t *);
3259 3262 extern void ip_input_post_ipsec(mblk_t *, ip_recv_attr_t *);
3260 3263 extern void ip_fanout_v4(mblk_t *, ipha_t *, ip_recv_attr_t *);
3261 3264 extern void ip_fanout_v6(mblk_t *, ip6_t *, ip_recv_attr_t *);
3262 3265 extern void ip_fanout_proto_conn(conn_t *, mblk_t *, ipha_t *, ip6_t *,
3263 3266 ip_recv_attr_t *);
3264 3267 extern void ip_fanout_proto_v4(mblk_t *, ipha_t *, ip_recv_attr_t *);
3265 3268 extern void ip_fanout_send_icmp_v4(mblk_t *, uint_t, uint_t,
3266 3269 ip_recv_attr_t *);
3267 3270 extern void ip_fanout_udp_conn(conn_t *, mblk_t *, ipha_t *, ip6_t *,
3268 3271 ip_recv_attr_t *);
3269 3272 extern void ip_fanout_udp_multi_v4(mblk_t *, ipha_t *, uint16_t, uint16_t,
3270 3273 ip_recv_attr_t *);
3271 3274 extern mblk_t *zero_spi_check(mblk_t *, ip_recv_attr_t *);
3272 3275 extern void ip_build_hdrs_v4(uchar_t *, uint_t, const ip_pkt_t *, uint8_t);
3273 3276 extern int ip_find_hdr_v4(ipha_t *, ip_pkt_t *, boolean_t);
3274 3277 extern int ip_total_hdrs_len_v4(const ip_pkt_t *);
3275 3278
3276 3279 extern mblk_t *ip_accept_tcp(ill_t *, ill_rx_ring_t *, squeue_t *,
3277 3280 mblk_t *, mblk_t **, uint_t *cnt);
3278 3281 extern void ip_rput_dlpi(ill_t *, mblk_t *);
3279 3282 extern void ip_rput_notdata(ill_t *, mblk_t *);
3280 3283
3281 3284 extern void ip_mib2_add_ip_stats(mib2_ipIfStatsEntry_t *,
3282 3285 mib2_ipIfStatsEntry_t *);
3283 3286 extern void ip_mib2_add_icmp6_stats(mib2_ipv6IfIcmpEntry_t *,
3284 3287 mib2_ipv6IfIcmpEntry_t *);
3285 3288 extern void ip_rput_other(ipsq_t *, queue_t *, mblk_t *, void *);
3286 3289 extern ire_t *ip_check_multihome(void *, ire_t *, ill_t *);
3287 3290 extern void ip_send_potential_redirect_v4(mblk_t *, ipha_t *, ire_t *,
3288 3291 ip_recv_attr_t *);
3289 3292 extern int ip_set_destination_v4(ipaddr_t *, ipaddr_t, ipaddr_t,
3290 3293 ip_xmit_attr_t *, iulp_t *, uint32_t, uint_t);
3291 3294 extern int ip_set_destination_v6(in6_addr_t *, const in6_addr_t *,
3292 3295 const in6_addr_t *, ip_xmit_attr_t *, iulp_t *, uint32_t, uint_t);
3293 3296
3294 3297 extern int ip_output_simple(mblk_t *, ip_xmit_attr_t *);
3295 3298 extern int ip_output_simple_v4(mblk_t *, ip_xmit_attr_t *);
3296 3299 extern int ip_output_simple_v6(mblk_t *, ip_xmit_attr_t *);
3297 3300 extern int ip_output_options(mblk_t *, ipha_t *, ip_xmit_attr_t *,
3298 3301 ill_t *);
3299 3302 extern void ip_output_local_options(ipha_t *, ip_stack_t *);
3300 3303
3301 3304 extern ip_xmit_attr_t *conn_get_ixa(conn_t *, boolean_t);
3302 3305 extern ip_xmit_attr_t *conn_get_ixa_tryhard(conn_t *, boolean_t);
3303 3306 extern ip_xmit_attr_t *conn_replace_ixa(conn_t *, ip_xmit_attr_t *);
3304 3307 extern ip_xmit_attr_t *conn_get_ixa_exclusive(conn_t *);
3305 3308 extern ip_xmit_attr_t *ip_xmit_attr_duplicate(ip_xmit_attr_t *);
3306 3309 extern void ip_xmit_attr_replace_tsl(ip_xmit_attr_t *, ts_label_t *);
3307 3310 extern void ip_xmit_attr_restore_tsl(ip_xmit_attr_t *, cred_t *);
3308 3311 boolean_t ip_recv_attr_replace_label(ip_recv_attr_t *, ts_label_t *);
3309 3312 extern void ixa_inactive(ip_xmit_attr_t *);
3310 3313 extern void ixa_refrele(ip_xmit_attr_t *);
3311 3314 extern boolean_t ixa_check_drain_insert(conn_t *, ip_xmit_attr_t *);
3312 3315 extern void ixa_cleanup(ip_xmit_attr_t *);
3313 3316 extern void ira_cleanup(ip_recv_attr_t *, boolean_t);
3314 3317 extern void ixa_safe_copy(ip_xmit_attr_t *, ip_xmit_attr_t *);
3315 3318
3316 3319 extern int conn_ip_output(mblk_t *, ip_xmit_attr_t *);
3317 3320 extern boolean_t ip_output_verify_local(ip_xmit_attr_t *);
3318 3321 extern mblk_t *ip_output_process_local(mblk_t *, ip_xmit_attr_t *, boolean_t,
3319 3322 boolean_t, conn_t *);
3320 3323
3321 3324 extern int conn_opt_get(conn_opt_arg_t *, t_scalar_t, t_scalar_t,
3322 3325 uchar_t *);
3323 3326 extern int conn_opt_set(conn_opt_arg_t *, t_scalar_t, t_scalar_t, uint_t,
3324 3327 uchar_t *, boolean_t, cred_t *);
3325 3328 extern boolean_t conn_same_as_last_v4(conn_t *, sin_t *);
3326 3329 extern boolean_t conn_same_as_last_v6(conn_t *, sin6_t *);
3327 3330 extern int conn_update_label(const conn_t *, const ip_xmit_attr_t *,
3328 3331 const in6_addr_t *, ip_pkt_t *);
3329 3332
3330 3333 extern int ip_opt_set_multicast_group(conn_t *, t_scalar_t,
3331 3334 uchar_t *, boolean_t, boolean_t);
3332 3335 extern int ip_opt_set_multicast_sources(conn_t *, t_scalar_t,
3333 3336 uchar_t *, boolean_t, boolean_t);
3334 3337 extern int conn_getsockname(conn_t *, struct sockaddr *, uint_t *);
3335 3338 extern int conn_getpeername(conn_t *, struct sockaddr *, uint_t *);
3336 3339
3337 3340 extern int conn_build_hdr_template(conn_t *, uint_t, uint_t,
3338 3341 const in6_addr_t *, const in6_addr_t *, uint32_t);
3339 3342 extern mblk_t *conn_prepend_hdr(ip_xmit_attr_t *, const ip_pkt_t *,
3340 3343 const in6_addr_t *, const in6_addr_t *, uint8_t, uint32_t, uint_t,
3341 3344 mblk_t *, uint_t, uint_t, uint32_t *, int *);
3342 3345 extern void ip_attr_newdst(ip_xmit_attr_t *);
3343 3346 extern void ip_attr_nexthop(const ip_pkt_t *, const ip_xmit_attr_t *,
3344 3347 const in6_addr_t *, in6_addr_t *);
3345 3348 extern int conn_connect(conn_t *, iulp_t *, uint32_t);
3346 3349 extern int ip_attr_connect(const conn_t *, ip_xmit_attr_t *,
3347 3350 const in6_addr_t *, const in6_addr_t *, const in6_addr_t *, in_port_t,
3348 3351 in6_addr_t *, iulp_t *, uint32_t);
3349 3352 extern int conn_inherit_parent(conn_t *, conn_t *);
3350 3353
3351 3354 extern void conn_ixa_cleanup(conn_t *connp, void *arg);
3352 3355
3353 3356 extern boolean_t conn_wantpacket(conn_t *, ip_recv_attr_t *, ipha_t *);
3354 3357 extern uint_t ip_type_v4(ipaddr_t, ip_stack_t *);
3355 3358 extern uint_t ip_type_v6(const in6_addr_t *, ip_stack_t *);
3356 3359
3357 3360 extern void ip_wput_nondata(queue_t *, mblk_t *);
3358 3361 extern void ip_wsrv(queue_t *);
3359 3362 extern char *ip_nv_lookup(nv_t *, int);
3360 3363 extern boolean_t ip_local_addr_ok_v6(const in6_addr_t *, const in6_addr_t *);
3361 3364 extern boolean_t ip_remote_addr_ok_v6(const in6_addr_t *, const in6_addr_t *);
3362 3365 extern ipaddr_t ip_massage_options(ipha_t *, netstack_t *);
3363 3366 extern ipaddr_t ip_net_mask(ipaddr_t);
3364 3367 extern void arp_bringup_done(ill_t *, int);
3365 3368 extern void arp_replumb_done(ill_t *, int);
3366 3369
3367 3370 extern struct qinit iprinitv6;
3368 3371
3369 3372 extern void ipmp_init(ip_stack_t *);
3370 3373 extern void ipmp_destroy(ip_stack_t *);
3371 3374 extern ipmp_grp_t *ipmp_grp_create(const char *, phyint_t *);
3372 3375 extern void ipmp_grp_destroy(ipmp_grp_t *);
3373 3376 extern void ipmp_grp_info(const ipmp_grp_t *, lifgroupinfo_t *);
3374 3377 extern int ipmp_grp_rename(ipmp_grp_t *, const char *);
3375 3378 extern ipmp_grp_t *ipmp_grp_lookup(const char *, ip_stack_t *);
3376 3379 extern int ipmp_grp_vet_phyint(ipmp_grp_t *, phyint_t *);
3377 3380 extern ipmp_illgrp_t *ipmp_illgrp_create(ill_t *);
3378 3381 extern void ipmp_illgrp_destroy(ipmp_illgrp_t *);
3379 3382 extern ill_t *ipmp_illgrp_add_ipif(ipmp_illgrp_t *, ipif_t *);
3380 3383 extern void ipmp_illgrp_del_ipif(ipmp_illgrp_t *, ipif_t *);
3381 3384 extern ill_t *ipmp_illgrp_next_ill(ipmp_illgrp_t *);
3382 3385 extern ill_t *ipmp_illgrp_hold_next_ill(ipmp_illgrp_t *);
3383 3386 extern ill_t *ipmp_illgrp_hold_cast_ill(ipmp_illgrp_t *);
3384 3387 extern ill_t *ipmp_illgrp_ipmp_ill(ipmp_illgrp_t *);
3385 3388 extern void ipmp_illgrp_refresh_mtu(ipmp_illgrp_t *);
3386 3389 extern ipmp_arpent_t *ipmp_illgrp_create_arpent(ipmp_illgrp_t *,
3387 3390 boolean_t, ipaddr_t, uchar_t *, size_t, uint16_t);
3388 3391 extern void ipmp_illgrp_destroy_arpent(ipmp_illgrp_t *, ipmp_arpent_t *);
3389 3392 extern ipmp_arpent_t *ipmp_illgrp_lookup_arpent(ipmp_illgrp_t *, ipaddr_t *);
3390 3393 extern void ipmp_illgrp_refresh_arpent(ipmp_illgrp_t *);
3391 3394 extern void ipmp_illgrp_mark_arpent(ipmp_illgrp_t *, ipmp_arpent_t *);
3392 3395 extern ill_t *ipmp_illgrp_find_ill(ipmp_illgrp_t *, uchar_t *, uint_t);
3393 3396 extern void ipmp_illgrp_link_grp(ipmp_illgrp_t *, ipmp_grp_t *);
3394 3397 extern int ipmp_illgrp_unlink_grp(ipmp_illgrp_t *);
3395 3398 extern uint_t ipmp_ill_get_ipmp_ifindex(const ill_t *);
3396 3399 extern void ipmp_ill_join_illgrp(ill_t *, ipmp_illgrp_t *);
3397 3400 extern void ipmp_ill_leave_illgrp(ill_t *);
3398 3401 extern ill_t *ipmp_ill_hold_ipmp_ill(ill_t *);
3399 3402 extern ill_t *ipmp_ill_hold_xmit_ill(ill_t *, boolean_t);
3400 3403 extern boolean_t ipmp_ill_is_active(ill_t *);
3401 3404 extern void ipmp_ill_refresh_active(ill_t *);
3402 3405 extern void ipmp_phyint_join_grp(phyint_t *, ipmp_grp_t *);
3403 3406 extern void ipmp_phyint_leave_grp(phyint_t *);
3404 3407 extern void ipmp_phyint_refresh_active(phyint_t *);
3405 3408 extern ill_t *ipmp_ipif_bound_ill(const ipif_t *);
3406 3409 extern ill_t *ipmp_ipif_hold_bound_ill(const ipif_t *);
3407 3410 extern boolean_t ipmp_ipif_is_dataaddr(const ipif_t *);
3408 3411 extern boolean_t ipmp_ipif_is_stubaddr(const ipif_t *);
3409 3412 extern boolean_t ipmp_packet_is_probe(mblk_t *, ill_t *);
3410 3413 extern void ipmp_ncec_delete_nce(ncec_t *);
3411 3414 extern void ipmp_ncec_refresh_nce(ncec_t *);
3412 3415
3413 3416 extern void conn_drain_insert(conn_t *, idl_tx_list_t *);
3414 3417 extern void conn_setqfull(conn_t *, boolean_t *);
3415 3418 extern void conn_clrqfull(conn_t *, boolean_t *);
3416 3419 extern int conn_ipsec_length(conn_t *);
3417 3420 extern ipaddr_t ip_get_dst(ipha_t *);
3418 3421 extern uint_t ip_get_pmtu(ip_xmit_attr_t *);
3419 3422 extern uint_t ip_get_base_mtu(ill_t *, ire_t *);
3420 3423 extern mblk_t *ip_output_attach_policy(mblk_t *, ipha_t *, ip6_t *,
3421 3424 const conn_t *, ip_xmit_attr_t *);
3422 3425 extern int ipsec_out_extra_length(ip_xmit_attr_t *);
3423 3426 extern int ipsec_out_process(mblk_t *, ip_xmit_attr_t *);
3424 3427 extern int ip_output_post_ipsec(mblk_t *, ip_xmit_attr_t *);
3425 3428 extern void ipsec_out_to_in(ip_xmit_attr_t *, ill_t *ill,
3426 3429 ip_recv_attr_t *);
3427 3430
3428 3431 extern void ire_cleanup(ire_t *);
3429 3432 extern void ire_inactive(ire_t *);
3430 3433 extern boolean_t irb_inactive(irb_t *);
3431 3434 extern ire_t *ire_unlink(irb_t *);
3432 3435
3433 3436 #ifdef DEBUG
3434 3437 extern boolean_t th_trace_ref(const void *, ip_stack_t *);
3435 3438 extern void th_trace_unref(const void *);
3436 3439 extern void th_trace_cleanup(const void *, boolean_t);
3437 3440 extern void ire_trace_ref(ire_t *);
3438 3441 extern void ire_untrace_ref(ire_t *);
3439 3442 #endif
3440 3443
3441 3444 extern int ip_srcid_insert(const in6_addr_t *, zoneid_t, ip_stack_t *);
3442 3445 extern int ip_srcid_remove(const in6_addr_t *, zoneid_t, ip_stack_t *);
3443 3446 extern void ip_srcid_find_id(uint_t, in6_addr_t *, zoneid_t, netstack_t *);
3444 3447 extern uint_t ip_srcid_find_addr(const in6_addr_t *, zoneid_t, netstack_t *);
3445 3448
3446 3449 extern uint8_t ipoptp_next(ipoptp_t *);
3447 3450 extern uint8_t ipoptp_first(ipoptp_t *, ipha_t *);
3448 3451 extern int ip_opt_get_user(conn_t *, uchar_t *);
3449 3452 extern int ipsec_req_from_conn(conn_t *, ipsec_req_t *, int);
3450 3453 extern int ip_snmp_get(queue_t *q, mblk_t *mctl, int level, boolean_t);
3451 3454 extern int ip_snmp_set(queue_t *q, int, int, uchar_t *, int);
3452 3455 extern void ip_process_ioctl(ipsq_t *, queue_t *, mblk_t *, void *);
3453 3456 extern void ip_quiesce_conn(conn_t *);
3454 3457 extern void ip_reprocess_ioctl(ipsq_t *, queue_t *, mblk_t *, void *);
3455 3458 extern void ip_ioctl_finish(queue_t *, mblk_t *, int, int, ipsq_t *);
3456 3459
3457 3460 extern boolean_t ip_cmpbuf(const void *, uint_t, boolean_t, const void *,
3458 3461 uint_t);
3459 3462 extern boolean_t ip_allocbuf(void **, uint_t *, boolean_t, const void *,
3460 3463 uint_t);
3461 3464 extern void ip_savebuf(void **, uint_t *, boolean_t, const void *, uint_t);
3462 3465
3463 3466 extern boolean_t ipsq_pending_mp_cleanup(ill_t *, conn_t *);
3464 3467 extern void conn_ioctl_cleanup(conn_t *);
3465 3468
3466 3469 extern void ip_unbind(conn_t *);
3467 3470
3468 3471 extern void tnet_init(void);
3469 3472 extern void tnet_fini(void);
3470 3473
3471 3474 /*
3472 3475 * Hook functions to enable cluster networking
3473 3476 * On non-clustered systems these vectors must always be NULL.
3474 3477 */
3475 3478 extern int (*cl_inet_isclusterwide)(netstackid_t stack_id, uint8_t protocol,
3476 3479 sa_family_t addr_family, uint8_t *laddrp, void *args);
3477 3480 extern uint32_t (*cl_inet_ipident)(netstackid_t stack_id, uint8_t protocol,
3478 3481 sa_family_t addr_family, uint8_t *laddrp, uint8_t *faddrp,
3479 3482 void *args);
3480 3483 extern int (*cl_inet_connect2)(netstackid_t stack_id, uint8_t protocol,
3481 3484 boolean_t is_outgoing, sa_family_t addr_family, uint8_t *laddrp,
3482 3485 in_port_t lport, uint8_t *faddrp, in_port_t fport, void *args);
3483 3486 extern void (*cl_inet_getspi)(netstackid_t, uint8_t, uint8_t *, size_t,
3484 3487 void *);
3485 3488 extern void (*cl_inet_getspi)(netstackid_t stack_id, uint8_t protocol,
3486 3489 uint8_t *ptr, size_t len, void *args);
3487 3490 extern int (*cl_inet_checkspi)(netstackid_t stack_id, uint8_t protocol,
3488 3491 uint32_t spi, void *args);
3489 3492 extern void (*cl_inet_deletespi)(netstackid_t stack_id, uint8_t protocol,
3490 3493 uint32_t spi, void *args);
3491 3494 extern void (*cl_inet_idlesa)(netstackid_t, uint8_t, uint32_t,
3492 3495 sa_family_t, in6_addr_t, in6_addr_t, void *);
3493 3496
3494 3497
3495 3498 /* Hooks for CGTP (multirt routes) filtering module */
3496 3499 #define CGTP_FILTER_REV_1 1
3497 3500 #define CGTP_FILTER_REV_2 2
3498 3501 #define CGTP_FILTER_REV_3 3
3499 3502 #define CGTP_FILTER_REV CGTP_FILTER_REV_3
3500 3503
3501 3504 /* cfo_filter and cfo_filter_v6 hooks return values */
3502 3505 #define CGTP_IP_PKT_NOT_CGTP 0
3503 3506 #define CGTP_IP_PKT_PREMIUM 1
3504 3507 #define CGTP_IP_PKT_DUPLICATE 2
3505 3508
3506 3509 /* Version 3 of the filter interface */
3507 3510 typedef struct cgtp_filter_ops {
3508 3511 int cfo_filter_rev; /* CGTP_FILTER_REV_3 */
3509 3512 int (*cfo_change_state)(netstackid_t, int);
3510 3513 int (*cfo_add_dest_v4)(netstackid_t, ipaddr_t, ipaddr_t,
3511 3514 ipaddr_t, ipaddr_t);
3512 3515 int (*cfo_del_dest_v4)(netstackid_t, ipaddr_t, ipaddr_t);
3513 3516 int (*cfo_add_dest_v6)(netstackid_t, in6_addr_t *, in6_addr_t *,
3514 3517 in6_addr_t *, in6_addr_t *);
3515 3518 int (*cfo_del_dest_v6)(netstackid_t, in6_addr_t *, in6_addr_t *);
3516 3519 int (*cfo_filter)(netstackid_t, uint_t, mblk_t *);
3517 3520 int (*cfo_filter_v6)(netstackid_t, uint_t, ip6_t *,
3518 3521 ip6_frag_t *);
3519 3522 } cgtp_filter_ops_t;
3520 3523
3521 3524 #define CGTP_MCAST_SUCCESS 1
3522 3525
3523 3526 /*
3524 3527 * The separate CGTP module needs this global symbol so that it
3525 3528 * can check the version and determine whether to use the old or the new
3526 3529 * version of the filtering interface.
3527 3530 */
3528 3531 extern int ip_cgtp_filter_rev;
3529 3532
3530 3533 extern int ip_cgtp_filter_supported(void);
3531 3534 extern int ip_cgtp_filter_register(netstackid_t, cgtp_filter_ops_t *);
3532 3535 extern int ip_cgtp_filter_unregister(netstackid_t);
3533 3536 extern int ip_cgtp_filter_is_registered(netstackid_t);
3534 3537
3535 3538 /*
3536 3539 * rr_ring_state cycles in the order shown below from RR_FREE through
3537 3540 * RR_FREE_IN_PROG and back to RR_FREE.
3538 3541 */
3539 3542 typedef enum {
3540 3543 RR_FREE, /* Free slot */
3541 3544 RR_SQUEUE_UNBOUND, /* Ring's squeue is unbound */
3542 3545 RR_SQUEUE_BIND_INPROG, /* Ring's squeue bind in progress */
3543 3546 RR_SQUEUE_BOUND, /* Ring's squeue bound to cpu */
3544 3547 RR_FREE_INPROG /* Ring is being freed */
3545 3548 } ip_ring_state_t;
3546 3549
3547 3550 #define ILL_MAX_RINGS 256 /* Max num of rx rings we can manage */
3548 3551 #define ILL_POLLING 0x01 /* Polling in use */
3549 3552
3550 3553 /*
3551 3554 * These functions pointer types are exported by the mac/dls layer.
3552 3555 * we need to duplicate the definitions here because we cannot
3553 3556 * include mac/dls header files here.
3554 3557 */
3555 3558 typedef boolean_t (*ip_mac_intr_disable_t)(void *);
3556 3559 typedef void (*ip_mac_intr_enable_t)(void *);
3557 3560 typedef ip_mac_tx_cookie_t (*ip_dld_tx_t)(void *, mblk_t *,
3558 3561 uint64_t, uint16_t);
3559 3562 typedef void (*ip_flow_enable_t)(void *, ip_mac_tx_cookie_t);
3560 3563 typedef void *(*ip_dld_callb_t)(void *,
3561 3564 ip_flow_enable_t, void *);
3562 3565 typedef boolean_t (*ip_dld_fctl_t)(void *, ip_mac_tx_cookie_t);
3563 3566 typedef int (*ip_capab_func_t)(void *, uint_t,
3564 3567 void *, uint_t);
3565 3568
3566 3569 /*
3567 3570 * POLLING README
3568 3571 * sq_get_pkts() is called to pick packets from softring in poll mode. It
3569 3572 * calls rr_rx to get the chain and process it with rr_ip_accept.
3570 3573 * rr_rx = mac_soft_ring_poll() to pick packets
3571 3574 * rr_ip_accept = ip_accept_tcp() to process packets
3572 3575 */
3573 3576
3574 3577 /*
3575 3578 * XXX: With protocol, service specific squeues, they will have
3576 3579 * specific acceptor functions.
3577 3580 */
3578 3581 typedef mblk_t *(*ip_mac_rx_t)(void *, size_t);
3579 3582 typedef mblk_t *(*ip_accept_t)(ill_t *, ill_rx_ring_t *,
3580 3583 squeue_t *, mblk_t *, mblk_t **, uint_t *);
3581 3584
3582 3585 /*
3583 3586 * rr_intr_enable, rr_intr_disable, rr_rx_handle, rr_rx:
3584 3587 * May be accessed while in the squeue AND after checking that SQS_POLL_CAPAB
3585 3588 * is set.
3586 3589 *
3587 3590 * rr_ring_state: Protected by ill_lock.
3588 3591 */
3589 3592 struct ill_rx_ring {
3590 3593 ip_mac_intr_disable_t rr_intr_disable; /* Interrupt disabling func */
3591 3594 ip_mac_intr_enable_t rr_intr_enable; /* Interrupt enabling func */
3592 3595 void *rr_intr_handle; /* Handle interrupt funcs */
3593 3596 ip_mac_rx_t rr_rx; /* Driver receive function */
3594 3597 ip_accept_t rr_ip_accept; /* IP accept function */
3595 3598 void *rr_rx_handle; /* Handle for Rx ring */
3596 3599 squeue_t *rr_sqp; /* Squeue the ring is bound to */
3597 3600 ill_t *rr_ill; /* back pointer to ill */
3598 3601 ip_ring_state_t rr_ring_state; /* State of this ring */
3599 3602 };
3600 3603
3601 3604 /*
3602 3605 * IP - DLD direct function call capability
3603 3606 * Suffixes, df - dld function, dh - dld handle,
3604 3607 * cf - client (IP) function, ch - client handle
3605 3608 */
3606 3609 typedef struct ill_dld_direct_s { /* DLD provided driver Tx */
3607 3610 ip_dld_tx_t idd_tx_df; /* str_mdata_fastpath_put */
3608 3611 void *idd_tx_dh; /* dld_str_t *dsp */
3609 3612 ip_dld_callb_t idd_tx_cb_df; /* mac_tx_srs_notify */
3610 3613 void *idd_tx_cb_dh; /* mac_client_handle_t *mch */
3611 3614 ip_dld_fctl_t idd_tx_fctl_df; /* mac_tx_is_flow_blocked */
3612 3615 void *idd_tx_fctl_dh; /* mac_client_handle */
3613 3616 } ill_dld_direct_t;
3614 3617
3615 3618 /* IP - DLD polling capability */
3616 3619 typedef struct ill_dld_poll_s {
3617 3620 ill_rx_ring_t idp_ring_tbl[ILL_MAX_RINGS];
3618 3621 } ill_dld_poll_t;
3619 3622
3620 3623 /* Describes ill->ill_dld_capab */
3621 3624 struct ill_dld_capab_s {
3622 3625 ip_capab_func_t idc_capab_df; /* dld_capab_func */
3623 3626 void *idc_capab_dh; /* dld_str_t *dsp */
3624 3627 ill_dld_direct_t idc_direct;
3625 3628 ill_dld_poll_t idc_poll;
3626 3629 };
3627 3630
3628 3631 /*
3629 3632 * IP squeues exports
3630 3633 */
3631 3634 extern boolean_t ip_squeue_fanout;
3632 3635
3633 3636 #define IP_SQUEUE_GET(hint) ip_squeue_random(hint)
3634 3637
3635 3638 extern void ip_squeue_init(void (*)(squeue_t *));
3636 3639 extern squeue_t *ip_squeue_random(uint_t);
3637 3640 extern squeue_t *ip_squeue_get(ill_rx_ring_t *);
3638 3641 extern squeue_t *ip_squeue_getfree(pri_t);
3639 3642 extern int ip_squeue_cpu_move(squeue_t *, processorid_t);
3640 3643 extern void *ip_squeue_add_ring(ill_t *, void *);
3641 3644 extern void ip_squeue_bind_ring(ill_t *, ill_rx_ring_t *, processorid_t);
3642 3645 extern void ip_squeue_clean_ring(ill_t *, ill_rx_ring_t *);
3643 3646 extern void ip_squeue_quiesce_ring(ill_t *, ill_rx_ring_t *);
3644 3647 extern void ip_squeue_restart_ring(ill_t *, ill_rx_ring_t *);
3645 3648 extern void ip_squeue_clean_all(ill_t *);
3646 3649 extern boolean_t ip_source_routed(ipha_t *, ip_stack_t *);
3647 3650
3648 3651 extern void tcp_wput(queue_t *, mblk_t *);
3649 3652
3650 3653 extern int ip_fill_mtuinfo(conn_t *, ip_xmit_attr_t *,
3651 3654 struct ip6_mtuinfo *);
3652 3655 extern hook_t *ipobs_register_hook(netstack_t *, pfv_t);
3653 3656 extern void ipobs_unregister_hook(netstack_t *, hook_t *);
3654 3657 extern void ipobs_hook(mblk_t *, int, zoneid_t, zoneid_t, const ill_t *,
3655 3658 ip_stack_t *);
3656 3659 typedef void (*ipsq_func_t)(ipsq_t *, queue_t *, mblk_t *, void *);
3657 3660
3658 3661 extern void dce_g_init(void);
3659 3662 extern void dce_g_destroy(void);
3660 3663 extern void dce_stack_init(ip_stack_t *);
3661 3664 extern void dce_stack_destroy(ip_stack_t *);
3662 3665 extern void dce_cleanup(uint_t, ip_stack_t *);
3663 3666 extern dce_t *dce_get_default(ip_stack_t *);
3664 3667 extern dce_t *dce_lookup_pkt(mblk_t *, ip_xmit_attr_t *, uint_t *);
3665 3668 extern dce_t *dce_lookup_v4(ipaddr_t, ip_stack_t *, uint_t *);
3666 3669 extern dce_t *dce_lookup_v6(const in6_addr_t *, uint_t, ip_stack_t *,
3667 3670 uint_t *);
3668 3671 extern dce_t *dce_lookup_and_add_v4(ipaddr_t, ip_stack_t *);
3669 3672 extern dce_t *dce_lookup_and_add_v6(const in6_addr_t *, uint_t,
3670 3673 ip_stack_t *);
3671 3674 extern int dce_update_uinfo_v4(ipaddr_t, iulp_t *, ip_stack_t *);
3672 3675 extern int dce_update_uinfo_v6(const in6_addr_t *, uint_t, iulp_t *,
3673 3676 ip_stack_t *);
3674 3677 extern int dce_update_uinfo(const in6_addr_t *, uint_t, iulp_t *,
3675 3678 ip_stack_t *);
3676 3679 extern void dce_increment_generation(dce_t *);
3677 3680 extern void dce_increment_all_generations(boolean_t, ip_stack_t *);
3678 3681 extern void dce_refrele(dce_t *);
3679 3682 extern void dce_refhold(dce_t *);
3680 3683 extern void dce_refrele_notr(dce_t *);
3681 3684 extern void dce_refhold_notr(dce_t *);
3682 3685 mblk_t *ip_snmp_get_mib2_ip_dce(queue_t *, mblk_t *, ip_stack_t *ipst);
3683 3686
3684 3687 extern ip_laddr_t ip_laddr_verify_v4(ipaddr_t, zoneid_t,
3685 3688 ip_stack_t *, boolean_t);
3686 3689 extern ip_laddr_t ip_laddr_verify_v6(const in6_addr_t *, zoneid_t,
3687 3690 ip_stack_t *, boolean_t, uint_t);
3688 3691 extern int ip_laddr_fanout_insert(conn_t *);
3689 3692
3690 3693 extern boolean_t ip_verify_src(mblk_t *, ip_xmit_attr_t *, uint_t *);
↓ open down ↓ |
3655 lines elided |
↑ open up ↑ |
3691 3694 extern int ip_verify_ire(mblk_t *, ip_xmit_attr_t *);
3692 3695
3693 3696 extern mblk_t *ip_xmit_attr_to_mblk(ip_xmit_attr_t *);
3694 3697 extern boolean_t ip_xmit_attr_from_mblk(mblk_t *, ip_xmit_attr_t *);
3695 3698 extern mblk_t *ip_xmit_attr_free_mblk(mblk_t *);
3696 3699 extern mblk_t *ip_recv_attr_to_mblk(ip_recv_attr_t *);
3697 3700 extern boolean_t ip_recv_attr_from_mblk(mblk_t *, ip_recv_attr_t *);
3698 3701 extern mblk_t *ip_recv_attr_free_mblk(mblk_t *);
3699 3702 extern boolean_t ip_recv_attr_is_mblk(mblk_t *);
3700 3703
3704 +extern char *inet_ntop(int, const void *, char *, int);
3705 +extern int _inet_pton(int, char *, void *);
3706 +#define inet_pton(x, y, z) _inet_pton(x, y, z)
3707 +
3701 3708 /*
3702 3709 * Squeue tags. Tags only need to be unique when the callback function is the
3703 3710 * same to distinguish between different calls, but we use unique tags for
3704 3711 * convenience anyway.
3705 3712 */
3706 3713 #define SQTAG_IP_INPUT 1
3707 3714 #define SQTAG_TCP_INPUT_ICMP_ERR 2
3708 3715 #define SQTAG_TCP6_INPUT_ICMP_ERR 3
3709 3716 #define SQTAG_IP_TCP_INPUT 4
3710 3717 #define SQTAG_IP6_TCP_INPUT 5
3711 3718 #define SQTAG_IP_TCP_CLOSE 6
3712 3719 #define SQTAG_TCP_OUTPUT 7
3713 3720 #define SQTAG_TCP_TIMER 8
3714 3721 #define SQTAG_TCP_TIMEWAIT 9
3715 3722 #define SQTAG_TCP_ACCEPT_FINISH 10
3716 3723 #define SQTAG_TCP_ACCEPT_FINISH_Q0 11
3717 3724 #define SQTAG_TCP_ACCEPT_PENDING 12
3718 3725 #define SQTAG_TCP_LISTEN_DISCON 13
3719 3726 #define SQTAG_TCP_CONN_REQ_1 14
3720 3727 #define SQTAG_TCP_EAGER_BLOWOFF 15
3721 3728 #define SQTAG_TCP_EAGER_CLEANUP 16
3722 3729 #define SQTAG_TCP_EAGER_CLEANUP_Q0 17
3723 3730 #define SQTAG_TCP_CONN_IND 18
3724 3731 #define SQTAG_TCP_RSRV 19
3725 3732 #define SQTAG_TCP_ABORT_BUCKET 20
3726 3733 #define SQTAG_TCP_REINPUT 21
3727 3734 #define SQTAG_TCP_REINPUT_EAGER 22
3728 3735 #define SQTAG_TCP_INPUT_MCTL 23
3729 3736 #define SQTAG_TCP_RPUTOTHER 24
3730 3737 #define SQTAG_IP_PROTO_AGAIN 25
3731 3738 #define SQTAG_IP_FANOUT_TCP 26
3732 3739 #define SQTAG_IPSQ_CLEAN_RING 27
3733 3740 #define SQTAG_TCP_WPUT_OTHER 28
3734 3741 #define SQTAG_TCP_CONN_REQ_UNBOUND 29
3735 3742 #define SQTAG_TCP_SEND_PENDING 30
3736 3743 #define SQTAG_BIND_RETRY 31
3737 3744 #define SQTAG_UDP_FANOUT 32
3738 3745 #define SQTAG_UDP_INPUT 33
3739 3746 #define SQTAG_UDP_WPUT 34
3740 3747 #define SQTAG_UDP_OUTPUT 35
3741 3748 #define SQTAG_TCP_KSSL_INPUT 36
3742 3749 #define SQTAG_TCP_DROP_Q0 37
3743 3750 #define SQTAG_TCP_CONN_REQ_2 38
3744 3751 #define SQTAG_IP_INPUT_RX_RING 39
3745 3752 #define SQTAG_SQUEUE_CHANGE 40
3746 3753 #define SQTAG_CONNECT_FINISH 41
3747 3754 #define SQTAG_SYNCHRONOUS_OP 42
3748 3755 #define SQTAG_TCP_SHUTDOWN_OUTPUT 43
3749 3756 #define SQTAG_TCP_IXA_CLEANUP 44
3750 3757 #define SQTAG_TCP_SEND_SYNACK 45
3751 3758
3752 3759 extern sin_t sin_null; /* Zero address for quick clears */
3753 3760 extern sin6_t sin6_null; /* Zero address for quick clears */
3754 3761
3755 3762 #endif /* _KERNEL */
3756 3763
3757 3764 #ifdef __cplusplus
3758 3765 }
3759 3766 #endif
3760 3767
3761 3768 #endif /* _INET_IP_H */
↓ open down ↓ |
51 lines elided |
↑ open up ↑ |
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX