1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
|
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright (c) 1991, 2010, Oracle and/or its affiliates. All rights reserved.
*/
/* Copyright (c) 1990 Mentat Inc. */
#ifndef _INET_TCP_H
#define _INET_TCP_H
#ifdef __cplusplus
extern "C" {
#endif
#include <sys/inttypes.h>
#include <netinet/ip6.h>
#include <netinet/tcp.h>
#include <sys/socket.h>
#include <sys/socket_proto.h>
#include <sys/md5.h>
#include <inet/common.h>
#include <inet/ip.h>
#include <inet/ip6.h>
#include <inet/mi.h>
#include <inet/mib2.h>
#include <inet/tcp_stack.h>
#include <inet/tcp_sack.h>
#include <inet/kssl/ksslapi.h>
/* TCP states */
#define TCPS_CLOSED -6
#define TCPS_IDLE -5 /* idle (opened, but not bound) */
#define TCPS_BOUND -4 /* bound, ready to connect or accept */
#define TCPS_LISTEN -3 /* listening for connection */
#define TCPS_SYN_SENT -2 /* active, have sent syn */
#define TCPS_SYN_RCVD -1 /* have received syn (and sent ours) */
/* states < TCPS_ESTABLISHED are those where connections not established */
#define TCPS_ESTABLISHED 0 /* established */
#define TCPS_CLOSE_WAIT 1 /* rcvd fin, waiting for close */
/* states > TCPS_CLOSE_WAIT are those where user has closed */
#define TCPS_FIN_WAIT_1 2 /* have closed and sent fin */
#define TCPS_CLOSING 3 /* closed, xchd FIN, await FIN ACK */
#define TCPS_LAST_ACK 4 /* had fin and close; await FIN ACK */
/* states > TCPS_CLOSE_WAIT && < TCPS_FIN_WAIT_2 await ACK of FIN */
#define TCPS_FIN_WAIT_2 5 /* have closed, fin is acked */
#define TCPS_TIME_WAIT 6 /* in 2*msl quiet wait after close */
/*
* Internal flags used in conjunction with the packet header flags.
* Used in tcp_input_data to keep track of what needs to be done.
*/
#define TH_LIMIT_XMIT 0x0400 /* Limited xmit is needed */
#define TH_XMIT_NEEDED 0x0800 /* Window opened - send queued data */
#define TH_REXMIT_NEEDED 0x1000 /* Time expired for unacked data */
#define TH_ACK_NEEDED 0x2000 /* Send an ack now. */
#define TH_NEED_SACK_REXMIT 0x4000 /* Use SACK info to retransmission */
#define TH_ACK_TIMER_NEEDED 0x8000 /* Start the delayed ACK timer */
#define TH_ORDREL_NEEDED 0x10000 /* Generate an ordrel indication */
#define TH_MARKNEXT_NEEDED 0x20000 /* Data should have MSGMARKNEXT */
#define TH_SEND_URP_MARK 0x40000 /* Send up tcp_urp_mark_mp */
/*
* TCP sequence numbers are 32 bit integers operated
* on with modular arithmetic. These macros can be
* used to compare such integers.
*/
#define SEQ_LT(a, b) ((int32_t)((a)-(b)) < 0)
#define SEQ_LEQ(a, b) ((int32_t)((a)-(b)) <= 0)
#define SEQ_GT(a, b) ((int32_t)((a)-(b)) > 0)
#define SEQ_GEQ(a, b) ((int32_t)((a)-(b)) >= 0)
/* TCP Protocol header */
typedef struct tcphdr_s {
uint8_t th_lport[2]; /* Source port */
uint8_t th_fport[2]; /* Destination port */
uint8_t th_seq[4]; /* Sequence number */
uint8_t th_ack[4]; /* Acknowledgement number */
uint8_t th_offset_and_rsrvd[1]; /* Offset to the packet data */
uint8_t th_flags[1];
uint8_t th_win[2]; /* Allocation number */
uint8_t th_sum[2]; /* TCP checksum */
uint8_t th_urp[2]; /* Urgent pointer */
} tcph_t;
#define TCP_HDR_LENGTH(tcph) \
((((tcph_t *)tcph)->th_offset_and_rsrvd[0] >>2) &(0xF << 2))
#define TCP_MAX_COMBINED_HEADER_LENGTH (60 + 60) /* Maxed out ip + tcp */
#define TCP_MAX_IP_OPTIONS_LENGTH (60 - IP_SIMPLE_HDR_LENGTH)
#define TCP_MAX_HDR_LENGTH 60
#define TCP_MAX_TCP_OPTIONS_LENGTH (60 - sizeof (tcpha_t))
#define TCP_MIN_HEADER_LENGTH 20
#define TCP_MAXWIN 65535
#define TCP_PORT_LEN sizeof (in_port_t)
#define TCP_MAX_WINSHIFT 14
#define TCP_MAX_LARGEWIN (TCP_MAXWIN << TCP_MAX_WINSHIFT)
#define TCP_MAX_LSO_LENGTH (IP_MAXPACKET - TCP_MAX_COMBINED_HEADER_LENGTH)
#define TCPIP_HDR_LENGTH(mp, n) \
(n) = IPH_HDR_LENGTH((mp)->b_rptr), \
(n) += TCP_HDR_LENGTH((tcpha_t *)&(mp)->b_rptr[(n)])
/* TCP Protocol header (used if the header is known to be 32-bit aligned) */
typedef struct tcphdra_s {
in_port_t tha_lport; /* Source port */
in_port_t tha_fport; /* Destination port */
uint32_t tha_seq; /* Sequence number */
uint32_t tha_ack; /* Acknowledgement number */
uint8_t tha_offset_and_reserved; /* Offset to the packet data */
uint8_t tha_flags;
uint16_t tha_win; /* Allocation number */
uint16_t tha_sum; /* TCP checksum */
uint16_t tha_urp; /* Urgent pointer */
} tcpha_t;
struct conn_s;
struct tcp_listen_cnt_s;
/*
* Control structure for each open TCP stream,
* defined only within the kernel or for a kmem user.
* NOTE: tcp_reinit_values MUST have a line for each field in this structure!
*/
#if (defined(_KERNEL) || defined(_KMEMUSER))
typedef struct tcp_s {
struct tcp_s *tcp_time_wait_next;
/* Pointer to next T/W block */
struct tcp_s *tcp_time_wait_prev;
/* Pointer to previous T/W next */
int64_t tcp_time_wait_expire;
struct conn_s *tcp_connp; /* back pointer to conn_t */
tcp_stack_t *tcp_tcps; /* back pointer to tcp_stack_t */
int32_t tcp_state;
int32_t tcp_rcv_ws; /* My window scale power */
int32_t tcp_snd_ws; /* Sender's window scale power */
uint32_t tcp_ts_recent; /* Timestamp of earliest unacked */
/* data segment */
clock_t tcp_rto; /* Round trip timeout */
clock_t tcp_last_rcv_lbolt;
/* lbolt on last packet, used for PAWS */
uint32_t tcp_snxt; /* Senders next seq num */
uint32_t tcp_swnd; /* Senders window (relative to suna) */
uint32_t tcp_mss; /* Max segment size */
uint32_t tcp_iss; /* Initial send seq num */
uint32_t tcp_rnxt; /* Seq we expect to recv next */
uint32_t tcp_rwnd;
/* Fields arranged in approximate access order along main paths */
mblk_t *tcp_xmit_head; /* Head of xmit/rexmit list */
mblk_t *tcp_xmit_last; /* Last valid data seen by tcp_wput */
mblk_t *tcp_xmit_tail; /* Last data sent */
uint32_t tcp_unsent; /* # of bytes in hand that are unsent */
uint32_t tcp_xmit_tail_unsent; /* # of unsent bytes in xmit_tail */
uint32_t tcp_suna; /* Sender unacknowledged */
uint32_t tcp_rexmit_nxt; /* Next rexmit seq num */
uint32_t tcp_rexmit_max; /* Max retran seq num */
int32_t tcp_snd_burst; /* Send burst factor */
uint32_t tcp_cwnd; /* Congestion window */
int32_t tcp_cwnd_cnt; /* cwnd cnt in congestion avoidance */
uint32_t tcp_ibsegs; /* Inbound segments on this stream */
uint32_t tcp_obsegs; /* Outbound segments on this stream */
uint32_t tcp_naglim; /* Tunable nagle limit */
uint32_t tcp_valid_bits;
#define TCP_ISS_VALID 0x1 /* Is the tcp_iss seq num active? */
#define TCP_FSS_VALID 0x2 /* Is the tcp_fss seq num active? */
#define TCP_URG_VALID 0x4 /* Is the tcp_urg seq num active? */
#define TCP_OFO_FIN_VALID 0x8 /* Has TCP received an out of order FIN? */
timeout_id_t tcp_timer_tid; /* Control block for timer service */
uchar_t tcp_timer_backoff; /* Backoff shift count. */
int64_t tcp_last_recv_time; /* Last time we receive a segment. */
uint32_t tcp_init_cwnd; /* Initial cwnd (start/restart) */
/* Following manipulated by TCP under squeue protection */
uint32_t
tcp_urp_last_valid : 1, /* Is tcp_urp_last valid? */
tcp_hard_binding : 1, /* TCP_DETACHED_NONEAGER */
tcp_fin_acked : 1, /* Has our FIN been acked? */
tcp_fin_rcvd : 1, /* Have we seen a FIN? */
tcp_fin_sent : 1, /* Have we sent our FIN yet? */
tcp_ordrel_done : 1, /* Have we sent the ord_rel upstream? */
tcp_detached : 1, /* If we're detached from a stream */
tcp_zero_win_probe: 1, /* Zero win probing is in progress */
tcp_loopback: 1, /* src and dst are the same machine */
tcp_localnet: 1, /* src and dst are on the same subnet */
tcp_syn_defense: 1, /* For defense against SYN attack */
#define tcp_dontdrop tcp_syn_defense
tcp_set_timer : 1,
tcp_active_open: 1, /* This is a active open */
tcp_rexmit : 1, /* TCP is retransmitting */
tcp_snd_sack_ok : 1, /* Can use SACK for this connection */
tcp_hwcksum : 1, /* The NIC is capable of hwcksum */
tcp_ip_forward_progress : 1,
tcp_ecn_ok : 1, /* Can use ECN for this connection */
tcp_ecn_echo_on : 1, /* Need to do ECN echo */
tcp_ecn_cwr_sent : 1, /* ECN_CWR has been sent */
tcp_cwr : 1, /* Cwnd has reduced recently */
tcp_pad_to_bit31 : 11;
/* Following manipulated by TCP under squeue protection */
uint32_t
tcp_snd_ts_ok : 1,
tcp_snd_ws_ok : 1,
tcp_reserved_port : 1,
tcp_in_free_list : 1,
tcp_snd_zcopy_on : 1, /* xmit zero-copy enabled */
tcp_snd_zcopy_aware : 1, /* client is zero-copy aware */
tcp_xmit_zc_clean : 1, /* the xmit list is free of zc-mblk */
tcp_wait_for_eagers : 1, /* Wait for eagers to disappear */
tcp_accept_error : 1, /* Error during TLI accept */
tcp_send_discon_ind : 1, /* TLI accept err, send discon ind */
tcp_cork : 1, /* tcp_cork option */
tcp_tconnind_started : 1, /* conn_ind message is being sent */
tcp_lso :1, /* Lower layer is capable of LSO */
tcp_is_wnd_shrnk : 1, /* Window has shrunk */
tcp_pad_to_bit_31 : 18;
uint32_t tcp_initial_pmtu; /* Initial outgoing Path MTU. */
mblk_t *tcp_reass_head; /* Out of order reassembly list head */
mblk_t *tcp_reass_tail; /* Out of order reassembly list tail */
/* SACK related info */
tcp_sack_info_t tcp_sack_info;
#define tcp_pipe tcp_sack_info.tcp_pipe
#define tcp_fack tcp_sack_info.tcp_fack
#define tcp_sack_snxt tcp_sack_info.tcp_sack_snxt
#define tcp_max_sack_blk tcp_sack_info.tcp_max_sack_blk
#define tcp_num_sack_blk tcp_sack_info.tcp_num_sack_blk
#define tcp_sack_list tcp_sack_info.tcp_sack_list
#define tcp_num_notsack_blk tcp_sack_info.tcp_num_notsack_blk
#define tcp_cnt_notsack_list tcp_sack_info.tcp_cnt_notsack_list
#define tcp_notsack_list tcp_sack_info.tcp_notsack_list
mblk_t *tcp_rcv_list; /* Queued until push, urgent data, */
mblk_t *tcp_rcv_last_head; /* optdata, or the count exceeds */
mblk_t *tcp_rcv_last_tail; /* tcp_rcv_push_wait. */
uint32_t tcp_rcv_cnt; /* tcp_rcv_list is b_next chain. */
uint32_t tcp_cwnd_ssthresh; /* Congestion window */
uint32_t tcp_cwnd_max;
uint32_t tcp_csuna; /* Clear (no rexmits in window) suna */
clock_t tcp_rtt_sa; /* Round trip smoothed average */
clock_t tcp_rtt_sd; /* Round trip smoothed deviation */
clock_t tcp_rtt_update; /* Round trip update(s) */
clock_t tcp_ms_we_have_waited; /* Total retrans time */
uint32_t tcp_swl1; /* These help us avoid using stale */
uint32_t tcp_swl2; /* packets to update state */
uint32_t tcp_rack; /* Seq # we have acked */
uint32_t tcp_rack_cnt; /* # of segs we have deferred ack */
uint32_t tcp_rack_cur_max; /* # of segs we may defer ack for now */
uint32_t tcp_rack_abs_max; /* # of segs we may defer ack ever */
timeout_id_t tcp_ack_tid; /* Delayed ACK timer ID */
timeout_id_t tcp_push_tid; /* Push timer ID */
uint32_t tcp_max_swnd; /* Maximum swnd we have seen */
struct tcp_s *tcp_listener; /* Our listener */
uint32_t tcp_irs; /* Initial recv seq num */
uint32_t tcp_fss; /* Final/fin send seq num */
uint32_t tcp_urg; /* Urgent data seq num */
clock_t tcp_first_timer_threshold; /* When to prod IP */
clock_t tcp_second_timer_threshold; /* When to give up completely */
clock_t tcp_first_ctimer_threshold; /* 1st threshold while connecting */
clock_t tcp_second_ctimer_threshold; /* 2nd ... while connecting */
uint32_t tcp_urp_last; /* Last urp for which signal sent */
mblk_t *tcp_urp_mp; /* T_EXDATA_IND for urgent byte */
mblk_t *tcp_urp_mark_mp; /* zero-length marked/unmarked msg */
int tcp_conn_req_cnt_q0; /* # of conn reqs in SYN_RCVD */
int tcp_conn_req_cnt_q; /* # of conn reqs in ESTABLISHED */
int tcp_conn_req_max; /* # of ESTABLISHED conn reqs allowed */
t_scalar_t tcp_conn_req_seqnum; /* Incrementing pending conn req ID */
#define tcp_ip_addr_cache tcp_reass_tail
/* Cache ip addresses that */
/* complete the 3-way handshake */
kmutex_t tcp_eager_lock;
struct tcp_s *tcp_eager_next_q; /* next eager in ESTABLISHED state */
struct tcp_s *tcp_eager_last_q; /* last eager in ESTABLISHED state */
struct tcp_s *tcp_eager_next_q0; /* next eager in SYN_RCVD state */
struct tcp_s *tcp_eager_prev_q0; /* prev eager in SYN_RCVD state */
/* all eagers form a circular list */
boolean_t tcp_conn_def_q0; /* move from q0 to q deferred */
union {
mblk_t *tcp_eager_conn_ind; /* T_CONN_IND waiting for 3rd ack. */
mblk_t *tcp_opts_conn_req; /* T_CONN_REQ w/ options processed */
} tcp_conn;
uint32_t tcp_syn_rcvd_timeout; /* How many SYN_RCVD timeout in q0 */
/* TCP Keepalive Timer members */
int32_t tcp_ka_last_intrvl; /* Last probe interval */
timeout_id_t tcp_ka_tid; /* Keepalive timer ID */
uint32_t tcp_ka_interval; /* Keepalive interval */
uint32_t tcp_ka_abort_thres; /* Keepalive abort threshold */
int32_t tcp_client_errno; /* How the client screwed up */
/*
* The header template lives in conn_ht_iphc allocated by tcp_build_hdrs
* We maintain three pointers into conn_ht_iphc.
*/
ipha_t *tcp_ipha; /* IPv4 header in conn_ht_iphc */
ip6_t *tcp_ip6h; /* IPv6 header in conn_ht_iphc */
tcpha_t *tcp_tcpha; /* TCP header in conn_ht_iphc */
uint16_t tcp_last_sent_len; /* Record length for nagle */
uint16_t tcp_last_recv_len; /* Used by DTrace */
uint16_t tcp_dupack_cnt; /* # of consequtive duplicate acks */
kmutex_t *tcp_acceptor_lockp; /* Ptr to tf_lock */
mblk_t *tcp_ordrel_mp; /* T_ordrel_ind mblk */
t_uscalar_t tcp_acceptor_id; /* ACCEPTOR_id */
int tcp_ipsec_overhead;
uint_t tcp_recvifindex; /* Last received IPV6_RCVPKTINFO */
uint_t tcp_recvhops; /* Last received IPV6_RECVHOPLIMIT */
uint_t tcp_recvtclass; /* Last received IPV6_RECVTCLASS */
ip6_hbh_t *tcp_hopopts; /* Last received IPV6_RECVHOPOPTS */
ip6_dest_t *tcp_dstopts; /* Last received IPV6_RECVDSTOPTS */
ip6_dest_t *tcp_rthdrdstopts; /* Last recv IPV6_RECVRTHDRDSTOPTS */
ip6_rthdr_t *tcp_rthdr; /* Last received IPV6_RECVRTHDR */
uint_t tcp_hopoptslen;
uint_t tcp_dstoptslen;
uint_t tcp_rthdrdstoptslen;
uint_t tcp_rthdrlen;
mblk_t *tcp_timercache;
kmutex_t tcp_closelock;
kcondvar_t tcp_closecv;
uint8_t tcp_closed;
uint8_t tcp_closeflags;
mblk_t tcp_closemp;
timeout_id_t tcp_linger_tid; /* Linger timer ID */
struct tcp_s *tcp_acceptor_hash; /* Acceptor hash chain */
struct tcp_s **tcp_ptpahn; /* Pointer to previous accept hash next. */
struct tcp_s *tcp_bind_hash; /* Bind hash chain */
struct tcp_s *tcp_bind_hash_port; /* tcp_t's bound to the same lport */
struct tcp_s **tcp_ptpbhn;
uint_t tcp_maxpsz_multiplier;
uint32_t tcp_lso_max; /* maximum LSO payload */
uint32_t tcp_ofo_fin_seq; /* Recv out of order FIN seq num */
uint32_t tcp_cwr_snd_max;
struct tcp_s *tcp_saved_listener; /* saved value of listener */
uint32_t tcp_in_ack_unsent; /* ACK for unsent data cnt. */
/*
* All fusion-related fields are protected by squeue.
*/
struct tcp_s *tcp_loopback_peer; /* peer tcp for loopback */
mblk_t *tcp_fused_sigurg_mp; /* M_PCSIG mblk for SIGURG */
uint32_t
tcp_fused : 1, /* loopback tcp in fusion mode */
tcp_unfusable : 1, /* fusion not allowed on endpoint */
tcp_fused_sigurg : 1, /* send SIGURG upon draining */
tcp_fuse_to_bit_31 : 29;
kmutex_t tcp_non_sq_lock;
/*
* This variable is accessed without any lock protection
* and therefore must not be declared as a bit field along
* with the rest which require such condition.
*/
boolean_t tcp_issocket; /* this is a socket tcp */
/* protected by the tcp_non_sq_lock lock */
uint32_t tcp_squeue_bytes;
/*
* Kernel SSL session information
*/
boolean_t tcp_kssl_pending; /* waiting for 1st SSL rec. */
boolean_t tcp_kssl_inhandshake; /* during SSL handshake */
kssl_ent_t tcp_kssl_ent; /* SSL table entry */
kssl_ctx_t tcp_kssl_ctx; /* SSL session */
/*
* tcp_closemp_used is protected by listener's tcp_eager_lock
* when used for eagers. When used for a tcp in TIME_WAIT state
* or in tcp_close(), it is not protected by any lock as we
* do not expect any other thread to use it concurrently.
* We do allow re-use of tcp_closemp in tcp_time_wait_collector()
* and tcp_close() but not concurrently.
*/
boolean_t tcp_closemp_used;
/*
* previous and next eagers in the list of droppable eagers. See
* the comments before MAKE_DROPPABLE(). These pointers are
* protected by listener's tcp_eager_lock.
*/
struct tcp_s *tcp_eager_prev_drop_q0;
struct tcp_s *tcp_eager_next_drop_q0;
/*
* Have we flow controlled xmitter?
* This variable can be modified outside the squeue and hence must
* not be declared as a bit field along with the rest that are
* modified only within the squeue.
* protected by the tcp_non_sq_lock lock.
*/
boolean_t tcp_flow_stopped;
/*
* Sender's next sequence number at the time the window was shrunk.
*/
uint32_t tcp_snxt_shrunk;
/*
* Socket generation number which is bumped when a connection attempt
* is initiated. Its main purpose is to ensure that the socket does not
* miss the asynchronous connected/disconnected notification.
*/
sock_connid_t tcp_connid;
/* mblk_t used to enter TCP's squeue from the service routine. */
mblk_t *tcp_rsrv_mp;
/* Mutex for accessing tcp_rsrv_mp */
kmutex_t tcp_rsrv_mp_lock;
/* For connection counting. */
struct tcp_listen_cnt_s *tcp_listen_cnt;
/* Segment reassembly timer. */
timeout_id_t tcp_reass_tid;
#ifdef DEBUG
pc_t tcmp_stk[15];
#endif
} tcp_t;
#ifdef DEBUG
#define TCP_DEBUG_GETPCSTACK(buffer, depth) ((void) getpcstack(buffer, \
depth))
#else
#define TCP_DEBUG_GETPCSTACK(buffer, depth)
#endif
extern void tcp_conn_reclaim(void *);
extern void tcp_free(tcp_t *tcp);
extern void tcp_ddi_g_init(void);
extern void tcp_ddi_g_destroy(void);
extern void *tcp_get_conn(void *arg, tcp_stack_t *);
extern mblk_t *tcp_snmp_get(queue_t *, mblk_t *);
extern int tcp_snmp_set(queue_t *, int, int, uchar_t *, int len);
/*
* The TCP Fanout structure for bind and acceptor hashes.
* The hash tables and their linkage (tcp_*_hash, tcp_ptp*hn) are
* protected by the per-bucket tf_lock. Each tcp_t
* inserted in the list points back at this lock using tcp_*_lockp.
*
* The bind and acceptor hash queues are lists of tcp_t.
*/
/* listener hash and acceptor hash queue head */
typedef struct tf_s {
tcp_t *tf_tcp;
kmutex_t tf_lock;
} tf_t;
/* Also used in ipclassifier.c */
extern struct kmem_cache *tcp_sack_info_cache;
#endif /* (defined(_KERNEL) || defined(_KMEMUSER)) */
/* Contract private interface between TCP and Clustering. */
#define CL_TCPI_V1 1 /* cl_tcpi_version number */
typedef struct cl_tcp_info_s {
ushort_t cl_tcpi_version; /* cl_tcp_info_t's version no */
ushort_t cl_tcpi_ipversion; /* IP version */
int32_t cl_tcpi_state; /* TCP state */
in_port_t cl_tcpi_lport; /* Local port */
in_port_t cl_tcpi_fport; /* Remote port */
in6_addr_t cl_tcpi_laddr_v6; /* Local IP address */
in6_addr_t cl_tcpi_faddr_v6; /* Remote IP address */
#ifdef _KERNEL
/* Note: V4_PART_OF_V6 is meant to be used only for _KERNEL defined stuff */
#define cl_tcpi_laddr V4_PART_OF_V6(cl_tcpi_laddr_v6)
#define cl_tcpi_faddr V4_PART_OF_V6(cl_tcpi_faddr_v6)
#endif /* _KERNEL */
} cl_tcp_info_t;
/*
* Hook functions to enable cluster networking
* On non-clustered systems these vectors must always be NULL.
*/
extern void (*cl_inet_listen)(netstackid_t, uint8_t, sa_family_t,
uint8_t *, in_port_t, void *);
extern void (*cl_inet_unlisten)(netstackid_t, uint8_t, sa_family_t,
uint8_t *, in_port_t, void *);
/*
* Contracted Consolidation Private ioctl for aborting TCP connections.
* In order to keep the offsets and size of the structure the same between
* a 32-bit application and a 64-bit amd64 kernel, we use a #pragma
* pack(4).
*/
#define TCP_IOC_ABORT_CONN (('T' << 8) + 91)
#if _LONG_LONG_ALIGNMENT == 8 && _LONG_LONG_ALIGNMENT_32 == 4
#pragma pack(4)
#endif
typedef struct tcp_ioc_abort_conn_s {
struct sockaddr_storage ac_local; /* local addr and port */
struct sockaddr_storage ac_remote; /* remote addr and port */
int32_t ac_start; /* start state */
int32_t ac_end; /* end state */
int32_t ac_zoneid; /* zoneid */
} tcp_ioc_abort_conn_t;
#if _LONG_LONG_ALIGNMENT == 8 && _LONG_LONG_ALIGNMENT_32 == 4
#pragma pack()
#endif
#ifdef __cplusplus
}
#endif
#endif /* _INET_TCP_H */
|