xref: /illumos-gate/usr/src/uts/common/inet/sctp/sctp_common.c (revision 0173c38a73f34277e0c97a19fedfd25d81ba8380)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 #pragma ident	"%Z%%M%	%I%	%E% SMI"
28 
29 #include <sys/types.h>
30 #include <sys/systm.h>
31 #include <sys/stream.h>
32 #include <sys/strsubr.h>
33 #include <sys/ddi.h>
34 #include <sys/sunddi.h>
35 #include <sys/kmem.h>
36 #include <sys/socket.h>
37 #include <sys/random.h>
38 #include <sys/tsol/tndb.h>
39 #include <sys/tsol/tnet.h>
40 
41 #include <netinet/in.h>
42 #include <netinet/ip6.h>
43 #include <netinet/sctp.h>
44 
45 #include <inet/common.h>
46 #include <inet/ip.h>
47 #include <inet/ip6.h>
48 #include <inet/ip_ire.h>
49 #include <inet/mib2.h>
50 #include <inet/nd.h>
51 #include <inet/optcom.h>
52 #include <inet/sctp_ip.h>
53 #include <inet/ipclassifier.h>
54 
55 #include "sctp_impl.h"
56 #include "sctp_addr.h"
57 #include "sctp_asconf.h"
58 
59 static struct kmem_cache *sctp_kmem_faddr_cache;
60 static void sctp_init_faddr(sctp_t *, sctp_faddr_t *, in6_addr_t *, mblk_t *);
61 
62 /* Set the source address.  Refer to comments in sctp_get_ire(). */
63 void
64 sctp_set_saddr(sctp_t *sctp, sctp_faddr_t *fp)
65 {
66 	boolean_t v6 = !fp->isv4;
67 
68 	if (sctp->sctp_bound_to_all) {
69 		V6_SET_ZERO(fp->saddr);
70 	} else {
71 		fp->saddr = sctp_get_valid_addr(sctp, v6);
72 		if (!v6 && IN6_IS_ADDR_V4MAPPED_ANY(&fp->saddr) ||
73 		    v6 && IN6_IS_ADDR_UNSPECIFIED(&fp->saddr)) {
74 			fp->state = SCTP_FADDRS_UNREACH;
75 			/* Disable heartbeat. */
76 			fp->hb_expiry = 0;
77 			fp->hb_pending = B_FALSE;
78 			fp->strikes = 0;
79 		}
80 	}
81 }
82 
83 /*
84  * Call this function to update the cached IRE of a peer addr fp.
85  */
86 void
87 sctp_get_ire(sctp_t *sctp, sctp_faddr_t *fp)
88 {
89 	ire_t		*ire;
90 	ipaddr_t	addr4;
91 	in6_addr_t	laddr;
92 	sctp_saddr_ipif_t *sp;
93 	uint_t		ipif_seqid;
94 	int		hdrlen;
95 	ts_label_t	*tsl;
96 
97 	/* Remove the previous cache IRE */
98 	if ((ire = fp->ire) != NULL) {
99 		IRE_REFRELE_NOTR(ire);
100 		fp->ire = NULL;
101 	}
102 
103 	/*
104 	 * If this addr is not reachable, mark it as unconfirmed for now, the
105 	 * state will be changed back to unreachable later in this function
106 	 * if it is still the case.
107 	 */
108 	if (fp->state == SCTP_FADDRS_UNREACH) {
109 		fp->state = SCTP_FADDRS_UNCONFIRMED;
110 	}
111 
112 	tsl = crgetlabel(CONN_CRED(sctp->sctp_connp));
113 
114 	if (fp->isv4) {
115 		IN6_V4MAPPED_TO_IPADDR(&fp->faddr, addr4);
116 		ire = ire_cache_lookup(addr4, sctp->sctp_zoneid, tsl);
117 		if (ire != NULL)
118 			IN6_IPADDR_TO_V4MAPPED(ire->ire_src_addr, &laddr);
119 	} else {
120 		ire = ire_cache_lookup_v6(&fp->faddr, sctp->sctp_zoneid, tsl);
121 		if (ire != NULL)
122 			laddr = ire->ire_src_addr_v6;
123 	}
124 
125 	if (ire == NULL) {
126 		dprint(3, ("ire2faddr: no ire for %x:%x:%x:%x\n",
127 		    SCTP_PRINTADDR(fp->faddr)));
128 		/*
129 		 * It is tempting to just leave the src addr
130 		 * unspecified and let IP figure it out, but we
131 		 * *cannot* do this, since IP may choose a src addr
132 		 * that is not part of this association... unless
133 		 * this sctp has bound to all addrs.  So if the ire
134 		 * lookup fails, try to find one in our src addr
135 		 * list, unless the sctp has bound to all addrs, in
136 		 * which case we change the src addr to unspec.
137 		 *
138 		 * Note that if this is a v6 endpoint but it does
139 		 * not have any v4 address at this point (e.g. may
140 		 * have been  deleted), sctp_get_valid_addr() will
141 		 * return mapped INADDR_ANY.  In this case, this
142 		 * address should be marked not reachable so that
143 		 * it won't be used to send data.
144 		 */
145 		sctp_set_saddr(sctp, fp);
146 		if (fp->state == SCTP_FADDRS_UNREACH)
147 			return;
148 		goto check_current;
149 	}
150 
151 	ipif_seqid = ire->ire_ipif->ipif_seqid;
152 	dprint(2, ("ire2faddr: got ire for %x:%x:%x:%x, ",
153 	    SCTP_PRINTADDR(fp->faddr)));
154 	if (fp->isv4) {
155 		dprint(2, ("src = %x\n", ire->ire_src_addr));
156 	} else {
157 		dprint(2, ("src=%x:%x:%x:%x\n",
158 		    SCTP_PRINTADDR(ire->ire_src_addr_v6)));
159 	}
160 
161 	/* Make sure the laddr is part of this association */
162 	if ((sp = sctp_ipif_lookup(sctp, ipif_seqid)) != NULL &&
163 	    !sp->saddr_ipif_dontsrc) {
164 		if (sp->saddr_ipif_unconfirmed == 1)
165 			sp->saddr_ipif_unconfirmed = 0;
166 		fp->saddr = laddr;
167 	} else {
168 		dprint(2, ("ire2faddr: src addr is not part of assc\n"));
169 
170 		/*
171 		 * Set the src to the first saddr and hope for the best.
172 		 * Note that we will still do the ire caching below.
173 		 * Otherwise, whenever we send a packet, we need to do
174 		 * the ire lookup again and still may not get the correct
175 		 * source address.  Note that this case should very seldomly
176 		 * happen.  One scenario this can happen is an app
177 		 * explicitly bind() to an address.  But that address is
178 		 * not the preferred source address to send to the peer.
179 		 */
180 		sctp_set_saddr(sctp, fp);
181 		if (fp->state == SCTP_FADDRS_UNREACH) {
182 			IRE_REFRELE(ire);
183 			return;
184 		}
185 	}
186 
187 	/*
188 	 * Note that ire_cache_lookup_*() returns an ire with the tracing
189 	 * bits enabled.  This requires the thread holding the ire also
190 	 * do the IRE_REFRELE().  Thus we need to do IRE_REFHOLD_NOTR()
191 	 * and then IRE_REFRELE() the ire here to make the tracing bits
192 	 * work.
193 	 */
194 	IRE_REFHOLD_NOTR(ire);
195 	IRE_REFRELE(ire);
196 
197 	/* Cache the IRE */
198 	fp->ire = ire;
199 	if (fp->ire->ire_type == IRE_LOOPBACK && !sctp->sctp_loopback)
200 		sctp->sctp_loopback = 1;
201 
202 	/*
203 	 * Pull out RTO information for this faddr and use it if we don't
204 	 * have any yet.
205 	 */
206 	if (fp->srtt == -1 && ire->ire_uinfo.iulp_rtt != 0) {
207 		/* The cached value is in ms. */
208 		fp->srtt = MSEC_TO_TICK(ire->ire_uinfo.iulp_rtt);
209 		fp->rttvar = MSEC_TO_TICK(ire->ire_uinfo.iulp_rtt_sd);
210 		fp->rto = 3 * fp->srtt;
211 
212 		/* Bound the RTO by configured min and max values */
213 		if (fp->rto < sctp->sctp_rto_min) {
214 			fp->rto = sctp->sctp_rto_min;
215 		}
216 		if (fp->rto > sctp->sctp_rto_max) {
217 			fp->rto = sctp->sctp_rto_max;
218 		}
219 	}
220 
221 	/*
222 	 * Record the MTU for this faddr. If the MTU for this faddr has
223 	 * changed, check if the assc MTU will also change.
224 	 */
225 	if (fp->isv4) {
226 		hdrlen = sctp->sctp_hdr_len;
227 	} else {
228 		hdrlen = sctp->sctp_hdr6_len;
229 	}
230 	if ((fp->sfa_pmss + hdrlen) != ire->ire_max_frag) {
231 		/* Make sure that sfa_pmss is a multiple of SCTP_ALIGN. */
232 		fp->sfa_pmss = (ire->ire_max_frag - hdrlen) & ~(SCTP_ALIGN - 1);
233 		if (fp->cwnd < (fp->sfa_pmss * 2)) {
234 			fp->cwnd = fp->sfa_pmss * sctp_slow_start_initial;
235 		}
236 	}
237 
238 check_current:
239 	if (fp == sctp->sctp_current)
240 		sctp_set_faddr_current(sctp, fp);
241 }
242 
243 void
244 sctp_update_ire(sctp_t *sctp)
245 {
246 	ire_t		*ire;
247 	sctp_faddr_t	*fp;
248 
249 	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
250 		if ((ire = fp->ire) == NULL)
251 			continue;
252 		mutex_enter(&ire->ire_lock);
253 
254 		/*
255 		 * If the cached IRE is going away, there is no point to
256 		 * update it.
257 		 */
258 		if (ire->ire_marks & IRE_MARK_CONDEMNED) {
259 			mutex_exit(&ire->ire_lock);
260 			IRE_REFRELE_NOTR(ire);
261 			fp->ire = NULL;
262 			continue;
263 		}
264 
265 		/*
266 		 * Only record the PMTU for this faddr if we actually have
267 		 * done discovery. This prevents initialized default from
268 		 * clobbering any real info that IP may have.
269 		 */
270 		if (fp->pmtu_discovered) {
271 			if (fp->isv4) {
272 				ire->ire_max_frag = fp->sfa_pmss +
273 				    sctp->sctp_hdr_len;
274 			} else {
275 				ire->ire_max_frag = fp->sfa_pmss +
276 				    sctp->sctp_hdr6_len;
277 			}
278 		}
279 
280 		if (sctp_rtt_updates != 0 &&
281 		    fp->rtt_updates >= sctp_rtt_updates) {
282 			/*
283 			 * If there is no old cached values, initialize them
284 			 * conservatively.  Set them to be (1.5 * new value).
285 			 * This code copied from ip_ire_advise().  The cached
286 			 * value is in ms.
287 			 */
288 			if (ire->ire_uinfo.iulp_rtt != 0) {
289 				ire->ire_uinfo.iulp_rtt =
290 				    (ire->ire_uinfo.iulp_rtt +
291 				    TICK_TO_MSEC(fp->srtt)) >> 1;
292 			} else {
293 				ire->ire_uinfo.iulp_rtt =
294 				    TICK_TO_MSEC(fp->srtt + (fp->srtt >> 1));
295 			}
296 			if (ire->ire_uinfo.iulp_rtt_sd != 0) {
297 				ire->ire_uinfo.iulp_rtt_sd =
298 					(ire->ire_uinfo.iulp_rtt_sd +
299 					TICK_TO_MSEC(fp->rttvar)) >> 1;
300 			} else {
301 				ire->ire_uinfo.iulp_rtt_sd =
302 				    TICK_TO_MSEC(fp->rttvar +
303 				    (fp->rttvar >> 1));
304 			}
305 			fp->rtt_updates = 0;
306 		}
307 		mutex_exit(&ire->ire_lock);
308 	}
309 }
310 
311 /*
312  * The sender must set the total length in the IP header.
313  * If sendto == NULL, the current will be used.
314  */
315 mblk_t *
316 sctp_make_mp(sctp_t *sctp, sctp_faddr_t *sendto, int trailer)
317 {
318 	mblk_t *mp;
319 	size_t ipsctplen;
320 	int isv4;
321 	sctp_faddr_t *fp;
322 
323 	ASSERT(sctp->sctp_current != NULL || sendto != NULL);
324 	if (sendto == NULL) {
325 		fp = sctp->sctp_current;
326 	} else {
327 		fp = sendto;
328 	}
329 	isv4 = fp->isv4;
330 
331 	/* Try to look for another IRE again. */
332 	if (fp->ire == NULL)
333 		sctp_get_ire(sctp, fp);
334 
335 	/* There is no suitable source address to use, return. */
336 	if (fp->state == SCTP_FADDRS_UNREACH)
337 		return (NULL);
338 
339 	if (isv4) {
340 		ipsctplen = sctp->sctp_hdr_len;
341 	} else {
342 		ipsctplen = sctp->sctp_hdr6_len;
343 	}
344 
345 	mp = allocb_cred(ipsctplen + sctp_wroff_xtra + trailer,
346 	    CONN_CRED(sctp->sctp_connp));
347 	if (mp == NULL) {
348 		ip1dbg(("sctp_make_mp: error making mp..\n"));
349 		return (NULL);
350 	}
351 	mp->b_rptr += sctp_wroff_xtra;
352 	mp->b_wptr = mp->b_rptr + ipsctplen;
353 
354 	ASSERT(OK_32PTR(mp->b_wptr));
355 
356 	if (isv4) {
357 		ipha_t *iph = (ipha_t *)mp->b_rptr;
358 
359 		bcopy(sctp->sctp_iphc, mp->b_rptr, ipsctplen);
360 		if (fp != sctp->sctp_current) {
361 			/* fiddle with the dst addr */
362 			IN6_V4MAPPED_TO_IPADDR(&fp->faddr, iph->ipha_dst);
363 			/* fix up src addr */
364 			if (!IN6_IS_ADDR_V4MAPPED_ANY(&fp->saddr)) {
365 				IN6_V4MAPPED_TO_IPADDR(&fp->saddr,
366 				    iph->ipha_src);
367 			} else if (sctp->sctp_bound_to_all) {
368 				iph->ipha_src = INADDR_ANY;
369 			}
370 		}
371 		/* set or clear the don't fragment bit */
372 		if (fp->df) {
373 			iph->ipha_fragment_offset_and_flags = htons(IPH_DF);
374 		} else {
375 			iph->ipha_fragment_offset_and_flags = 0;
376 		}
377 	} else {
378 		bcopy(sctp->sctp_iphc6, mp->b_rptr, ipsctplen);
379 		if (fp != sctp->sctp_current) {
380 			/* fiddle with the dst addr */
381 			((ip6_t *)(mp->b_rptr))->ip6_dst = fp->faddr;
382 			/* fix up src addr */
383 			if (!IN6_IS_ADDR_UNSPECIFIED(&fp->saddr)) {
384 				((ip6_t *)(mp->b_rptr))->ip6_src = fp->saddr;
385 			} else if (sctp->sctp_bound_to_all) {
386 				bzero(&((ip6_t *)(mp->b_rptr))->ip6_src,
387 				    sizeof (in6_addr_t));
388 			}
389 		}
390 	}
391 	ASSERT(sctp->sctp_connp != NULL);
392 
393 	/*
394 	 * IP will not free this IRE if it is condemned.  SCTP needs to
395 	 * free it.
396 	 */
397 	if ((fp->ire != NULL) && (fp->ire->ire_marks & IRE_MARK_CONDEMNED)) {
398 		IRE_REFRELE_NOTR(fp->ire);
399 		fp->ire = NULL;
400 	}
401 	/* Stash the conn and ire ptr info. for IP */
402 	SCTP_STASH_IPINFO(mp, fp->ire);
403 
404 	return (mp);
405 }
406 
407 /*
408  * Notify upper layers about preferred write offset, write size.
409  */
410 void
411 sctp_set_ulp_prop(sctp_t *sctp)
412 {
413 	int hdrlen;
414 
415 	if (sctp->sctp_current->isv4) {
416 		hdrlen = sctp->sctp_hdr_len;
417 	} else {
418 		hdrlen = sctp->sctp_hdr6_len;
419 	}
420 	ASSERT(sctp->sctp_ulpd);
421 
422 	ASSERT(sctp->sctp_current->sfa_pmss == sctp->sctp_mss);
423 	sctp->sctp_ulp_prop(sctp->sctp_ulpd,
424 	    sctp_wroff_xtra + hdrlen + sizeof (sctp_data_hdr_t),
425 	    sctp->sctp_mss - sizeof (sctp_data_hdr_t));
426 }
427 
428 void
429 sctp_set_iplen(sctp_t *sctp, mblk_t *mp)
430 {
431 	uint16_t	sum = 0;
432 	ipha_t		*iph;
433 	ip6_t		*ip6h;
434 	mblk_t		*pmp = mp;
435 	boolean_t	isv4;
436 
437 	isv4 = (IPH_HDR_VERSION(mp->b_rptr) == IPV4_VERSION);
438 	for (; pmp; pmp = pmp->b_cont)
439 		sum += pmp->b_wptr - pmp->b_rptr;
440 
441 	if (isv4) {
442 		iph = (ipha_t *)mp->b_rptr;
443 		iph->ipha_length = htons(sum);
444 	} else {
445 		ip6h = (ip6_t *)mp->b_rptr;
446 		/*
447 		 * If an ip6i_t is present, the real IPv6 header
448 		 * immediately follows.
449 		 */
450 		if (ip6h->ip6_nxt == IPPROTO_RAW)
451 			ip6h = (ip6_t *)&ip6h[1];
452 		ip6h->ip6_plen = htons(sum - ((char *)&sctp->sctp_ip6h[1] -
453 		    sctp->sctp_iphc6));
454 	}
455 }
456 
457 int
458 sctp_compare_faddrsets(sctp_faddr_t *a1, sctp_faddr_t *a2)
459 {
460 	int na1 = 0;
461 	int overlap = 0;
462 	int equal = 1;
463 	int onematch;
464 	sctp_faddr_t *fp1, *fp2;
465 
466 	for (fp1 = a1; fp1; fp1 = fp1->next) {
467 		onematch = 0;
468 		for (fp2 = a2; fp2; fp2 = fp2->next) {
469 			if (IN6_ARE_ADDR_EQUAL(&fp1->faddr, &fp2->faddr)) {
470 				overlap++;
471 				onematch = 1;
472 				break;
473 			}
474 			if (!onematch) {
475 				equal = 0;
476 			}
477 		}
478 		na1++;
479 	}
480 
481 	if (equal) {
482 		return (SCTP_ADDR_EQUAL);
483 	}
484 	if (overlap == na1) {
485 		return (SCTP_ADDR_SUBSET);
486 	}
487 	if (overlap) {
488 		return (SCTP_ADDR_OVERLAP);
489 	}
490 	return (SCTP_ADDR_DISJOINT);
491 }
492 
493 /*
494  * Returns 0 on success, -1 on memory allocation failure. If sleep
495  * is true, this function should never fail.  The boolean parameter
496  * first decides whether the newly created faddr structure should be
497  * added at the beginning of the list or at the end.
498  *
499  * Note: caller must hold conn fanout lock.
500  */
501 int
502 sctp_add_faddr(sctp_t *sctp, in6_addr_t *addr, int sleep, boolean_t first)
503 {
504 	sctp_faddr_t	*faddr;
505 	mblk_t		*timer_mp;
506 
507 	if (is_system_labeled()) {
508 		ts_label_t *tsl;
509 		tsol_tpc_t *rhtp;
510 		int retv;
511 
512 		tsl = crgetlabel(CONN_CRED(sctp->sctp_connp));
513 		ASSERT(tsl != NULL);
514 
515 		/* find_tpc automatically does the right thing with IPv4 */
516 		rhtp = find_tpc(addr, IPV6_VERSION, B_FALSE);
517 		if (rhtp == NULL)
518 			return (EACCES);
519 
520 		retv = EACCES;
521 		if (tsl->tsl_doi == rhtp->tpc_tp.tp_doi) {
522 			switch (rhtp->tpc_tp.host_type) {
523 			case UNLABELED:
524 				/*
525 				 * Can talk to unlabeled hosts if any of the
526 				 * following are true:
527 				 *   1. zone's label matches the remote host's
528 				 *	default label,
529 				 *   2. mac_exempt is on and the zone dominates
530 				 *	the remote host's label, or
531 				 *   3. mac_exempt is on and the socket is from
532 				 *	the global zone.
533 				 */
534 				if (blequal(&rhtp->tpc_tp.tp_def_label,
535 				    &tsl->tsl_label) ||
536 				    (sctp->sctp_mac_exempt &&
537 				    (sctp->sctp_zoneid == GLOBAL_ZONEID ||
538 				    bldominates(&tsl->tsl_label,
539 				    &rhtp->tpc_tp.tp_def_label))))
540 					retv = 0;
541 				break;
542 			case SUN_CIPSO:
543 				if (_blinrange(&tsl->tsl_label,
544 				    &rhtp->tpc_tp.tp_sl_range_cipso) ||
545 				    blinlset(&tsl->tsl_label,
546 				    rhtp->tpc_tp.tp_sl_set_cipso))
547 					retv = 0;
548 				break;
549 			}
550 		}
551 		TPC_RELE(rhtp);
552 		if (retv != 0)
553 			return (retv);
554 	}
555 
556 	if ((faddr = kmem_cache_alloc(sctp_kmem_faddr_cache, sleep)) == NULL)
557 		return (ENOMEM);
558 	timer_mp = sctp_timer_alloc((sctp), sctp_rexmit_timer);
559 	if (timer_mp == NULL) {
560 		kmem_cache_free(sctp_kmem_faddr_cache, faddr);
561 		return (ENOMEM);
562 	}
563 	((sctpt_t *)(timer_mp->b_rptr))->sctpt_faddr = faddr;
564 
565 	sctp_init_faddr(sctp, faddr, addr, timer_mp);
566 	ASSERT(faddr->next == NULL);
567 
568 	if (sctp->sctp_faddrs == NULL) {
569 		ASSERT(sctp->sctp_lastfaddr == NULL);
570 		/* only element on list; first and last are same */
571 		sctp->sctp_faddrs = sctp->sctp_lastfaddr = faddr;
572 	} else if (first) {
573 		ASSERT(sctp->sctp_lastfaddr != NULL);
574 		faddr->next = sctp->sctp_faddrs;
575 		sctp->sctp_faddrs = faddr;
576 	} else {
577 		sctp->sctp_lastfaddr->next = faddr;
578 		sctp->sctp_lastfaddr = faddr;
579 	}
580 	sctp->sctp_nfaddrs++;
581 
582 	return (0);
583 }
584 
585 sctp_faddr_t *
586 sctp_lookup_faddr(sctp_t *sctp, in6_addr_t *addr)
587 {
588 	sctp_faddr_t *fp;
589 
590 	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
591 		if (IN6_ARE_ADDR_EQUAL(&fp->faddr, addr))
592 			break;
593 	}
594 
595 	return (fp);
596 }
597 
598 sctp_faddr_t *
599 sctp_lookup_faddr_nosctp(sctp_faddr_t *fp, in6_addr_t *addr)
600 {
601 	for (; fp; fp = fp->next) {
602 		if (IN6_ARE_ADDR_EQUAL(&fp->faddr, addr)) {
603 			break;
604 		}
605 	}
606 
607 	return (fp);
608 }
609 
610 /*
611  * To change the currently used peer address to the specified one.
612  */
613 void
614 sctp_set_faddr_current(sctp_t *sctp, sctp_faddr_t *fp)
615 {
616 	/* Now setup the composite header. */
617 	if (fp->isv4) {
618 		IN6_V4MAPPED_TO_IPADDR(&fp->faddr,
619 		    sctp->sctp_ipha->ipha_dst);
620 		IN6_V4MAPPED_TO_IPADDR(&fp->saddr, sctp->sctp_ipha->ipha_src);
621 		/* update don't fragment bit */
622 		if (fp->df) {
623 			sctp->sctp_ipha->ipha_fragment_offset_and_flags =
624 			    htons(IPH_DF);
625 		} else {
626 			sctp->sctp_ipha->ipha_fragment_offset_and_flags = 0;
627 		}
628 	} else {
629 		sctp->sctp_ip6h->ip6_dst = fp->faddr;
630 		sctp->sctp_ip6h->ip6_src = fp->saddr;
631 	}
632 
633 	sctp->sctp_current = fp;
634 	sctp->sctp_mss = fp->sfa_pmss;
635 
636 	/* Update the uppper layer for the change. */
637 	if (!SCTP_IS_DETACHED(sctp))
638 		sctp_set_ulp_prop(sctp);
639 }
640 
641 void
642 sctp_redo_faddr_srcs(sctp_t *sctp)
643 {
644 	sctp_faddr_t *fp;
645 
646 	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
647 		sctp_get_ire(sctp, fp);
648 	}
649 }
650 
651 void
652 sctp_faddr_alive(sctp_t *sctp, sctp_faddr_t *fp)
653 {
654 	int64_t now = lbolt64;
655 
656 	fp->strikes = 0;
657 	sctp->sctp_strikes = 0;
658 	fp->lastactive = now;
659 	fp->hb_expiry = now + SET_HB_INTVL(fp);
660 	fp->hb_pending = B_FALSE;
661 	if (fp->state != SCTP_FADDRS_ALIVE) {
662 		fp->state = SCTP_FADDRS_ALIVE;
663 		sctp_intf_event(sctp, fp->faddr, SCTP_ADDR_AVAILABLE, 0);
664 
665 		/*
666 		 * If this is the primary, switch back to it now.  And
667 		 * we probably want to reset the source addr used to reach
668 		 * it.
669 		 */
670 		if (fp == sctp->sctp_primary) {
671 			sctp_set_faddr_current(sctp, fp);
672 			sctp_get_ire(sctp, fp);
673 			return;
674 		}
675 	}
676 	if (fp->ire == NULL) {
677 		/* Should have a full IRE now */
678 		sctp_get_ire(sctp, fp);
679 	}
680 }
681 
682 int
683 sctp_is_a_faddr_clean(sctp_t *sctp)
684 {
685 	sctp_faddr_t *fp;
686 
687 	for (fp = sctp->sctp_faddrs; fp; fp = fp->next) {
688 		if (fp->state == SCTP_FADDRS_ALIVE && fp->strikes == 0) {
689 			return (1);
690 		}
691 	}
692 
693 	return (0);
694 }
695 
696 /*
697  * Returns 0 if there is at leave one other active faddr, -1 if there
698  * are none. If there are none left, faddr_dead() will start killing the
699  * association.
700  * If the downed faddr was the current faddr, a new current faddr
701  * will be chosen.
702  */
703 int
704 sctp_faddr_dead(sctp_t *sctp, sctp_faddr_t *fp, int newstate)
705 {
706 	sctp_faddr_t *ofp;
707 
708 	if (fp->state == SCTP_FADDRS_ALIVE) {
709 		sctp_intf_event(sctp, fp->faddr, SCTP_ADDR_UNREACHABLE, 0);
710 	}
711 	fp->state = newstate;
712 
713 	dprint(1, ("sctp_faddr_dead: %x:%x:%x:%x down (state=%d)\n",
714 	    SCTP_PRINTADDR(fp->faddr), newstate));
715 
716 	if (fp == sctp->sctp_current) {
717 		/* Current faddr down; need to switch it */
718 		sctp->sctp_current = NULL;
719 	}
720 
721 	/* Find next alive faddr */
722 	ofp = fp;
723 	for (fp = fp->next; fp != NULL; fp = fp->next) {
724 		if (fp->state == SCTP_FADDRS_ALIVE) {
725 			break;
726 		}
727 	}
728 
729 	if (fp == NULL) {
730 		/* Continue from beginning of list */
731 		for (fp = sctp->sctp_faddrs; fp != ofp; fp = fp->next) {
732 			if (fp->state == SCTP_FADDRS_ALIVE) {
733 				break;
734 			}
735 		}
736 	}
737 
738 	/*
739 	 * Find a new fp, so if the current faddr is dead, use the new fp
740 	 * as the current one.
741 	 */
742 	if (fp != ofp) {
743 		if (sctp->sctp_current == NULL) {
744 			dprint(1, ("sctp_faddr_dead: failover->%x:%x:%x:%x\n",
745 			    SCTP_PRINTADDR(fp->faddr)));
746 			/*
747 			 * Note that we don't need to reset the source addr
748 			 * of the new fp.
749 			 */
750 			sctp_set_faddr_current(sctp, fp);
751 		}
752 		return (0);
753 	}
754 
755 
756 	/* All faddrs are down; kill the association */
757 	dprint(1, ("sctp_faddr_dead: all faddrs down, killing assoc\n"));
758 	BUMP_MIB(&sctp_mib, sctpAborted);
759 	sctp_assoc_event(sctp, sctp->sctp_state < SCTPS_ESTABLISHED ?
760 	    SCTP_CANT_STR_ASSOC : SCTP_COMM_LOST, 0, NULL);
761 	sctp_clean_death(sctp, sctp->sctp_client_errno ?
762 	    sctp->sctp_client_errno : ETIMEDOUT);
763 
764 	return (-1);
765 }
766 
767 sctp_faddr_t *
768 sctp_rotate_faddr(sctp_t *sctp, sctp_faddr_t *ofp)
769 {
770 	sctp_faddr_t *nfp = NULL;
771 
772 	if (ofp == NULL) {
773 		ofp = sctp->sctp_current;
774 	}
775 
776 	/* Find the next live one */
777 	for (nfp = ofp->next; nfp != NULL; nfp = nfp->next) {
778 		if (nfp->state == SCTP_FADDRS_ALIVE) {
779 			break;
780 		}
781 	}
782 
783 	if (nfp == NULL) {
784 		/* Continue from beginning of list */
785 		for (nfp = sctp->sctp_faddrs; nfp != ofp; nfp = nfp->next) {
786 			if (nfp->state == SCTP_FADDRS_ALIVE) {
787 				break;
788 			}
789 		}
790 	}
791 
792 	/*
793 	 * nfp could only be NULL if all faddrs are down, and when
794 	 * this happens, faddr_dead() should have killed the
795 	 * association. Hence this assertion...
796 	 */
797 	ASSERT(nfp != NULL);
798 	return (nfp);
799 }
800 
801 void
802 sctp_unlink_faddr(sctp_t *sctp, sctp_faddr_t *fp)
803 {
804 	sctp_faddr_t *fpp;
805 
806 	if (!sctp->sctp_faddrs) {
807 		return;
808 	}
809 
810 	if (fp->timer_mp != NULL) {
811 		sctp_timer_free(fp->timer_mp);
812 		fp->timer_mp = NULL;
813 		fp->timer_running = 0;
814 	}
815 	if (fp->rc_timer_mp != NULL) {
816 		sctp_timer_free(fp->rc_timer_mp);
817 		fp->rc_timer_mp = NULL;
818 		fp->rc_timer_running = 0;
819 	}
820 	if (fp->ire != NULL) {
821 		IRE_REFRELE_NOTR(fp->ire);
822 		fp->ire = NULL;
823 	}
824 
825 	if (fp == sctp->sctp_faddrs) {
826 		goto gotit;
827 	}
828 
829 	for (fpp = sctp->sctp_faddrs; fpp->next != fp; fpp = fpp->next)
830 		;
831 
832 gotit:
833 	ASSERT(sctp->sctp_conn_tfp != NULL);
834 	mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
835 	if (fp == sctp->sctp_faddrs) {
836 		sctp->sctp_faddrs = fp->next;
837 	} else {
838 		fpp->next = fp->next;
839 	}
840 	mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
841 	/* XXX faddr2ire? */
842 	kmem_cache_free(sctp_kmem_faddr_cache, fp);
843 	sctp->sctp_nfaddrs--;
844 }
845 
846 void
847 sctp_zap_faddrs(sctp_t *sctp, int caller_holds_lock)
848 {
849 	sctp_faddr_t *fp, *fpn;
850 
851 	if (sctp->sctp_faddrs == NULL) {
852 		ASSERT(sctp->sctp_lastfaddr == NULL);
853 		return;
854 	}
855 
856 	ASSERT(sctp->sctp_lastfaddr != NULL);
857 	sctp->sctp_lastfaddr = NULL;
858 	sctp->sctp_current = NULL;
859 	sctp->sctp_primary = NULL;
860 
861 	sctp_free_faddr_timers(sctp);
862 
863 	if (sctp->sctp_conn_tfp != NULL && !caller_holds_lock) {
864 		/* in conn fanout; need to hold lock */
865 		mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
866 	}
867 
868 	for (fp = sctp->sctp_faddrs; fp; fp = fpn) {
869 		fpn = fp->next;
870 		if (fp->ire != NULL)
871 			IRE_REFRELE_NOTR(fp->ire);
872 		kmem_cache_free(sctp_kmem_faddr_cache, fp);
873 		sctp->sctp_nfaddrs--;
874 	}
875 
876 	sctp->sctp_faddrs = NULL;
877 	ASSERT(sctp->sctp_nfaddrs == 0);
878 	if (sctp->sctp_conn_tfp != NULL && !caller_holds_lock) {
879 		mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
880 	}
881 
882 }
883 
884 void
885 sctp_zap_addrs(sctp_t *sctp)
886 {
887 	sctp_zap_faddrs(sctp, 0);
888 	sctp_free_saddrs(sctp);
889 }
890 
891 /*
892  * Initialize the IPv4 header. Loses any record of any IP options.
893  */
894 int
895 sctp_header_init_ipv4(sctp_t *sctp, int sleep)
896 {
897 	sctp_hdr_t	*sctph;
898 
899 	/*
900 	 * This is a simple initialization. If there's
901 	 * already a template, it should never be too small,
902 	 * so reuse it.  Otherwise, allocate space for the new one.
903 	 */
904 	if (sctp->sctp_iphc != NULL) {
905 		ASSERT(sctp->sctp_iphc_len >= SCTP_MAX_COMBINED_HEADER_LENGTH);
906 		bzero(sctp->sctp_iphc, sctp->sctp_iphc_len);
907 	} else {
908 		sctp->sctp_iphc_len = SCTP_MAX_COMBINED_HEADER_LENGTH;
909 		sctp->sctp_iphc = kmem_zalloc(sctp->sctp_iphc_len, sleep);
910 		if (sctp->sctp_iphc == NULL) {
911 			sctp->sctp_iphc_len = 0;
912 			return (ENOMEM);
913 		}
914 	}
915 
916 	sctp->sctp_ipha = (ipha_t *)sctp->sctp_iphc;
917 
918 	sctp->sctp_hdr_len = sizeof (ipha_t) + sizeof (sctp_hdr_t);
919 	sctp->sctp_ip_hdr_len = sizeof (ipha_t);
920 	sctp->sctp_ipha->ipha_length = htons(sizeof (ipha_t) +
921 	    sizeof (sctp_hdr_t));
922 	sctp->sctp_ipha->ipha_version_and_hdr_length
923 		= (IP_VERSION << 4) | IP_SIMPLE_HDR_LENGTH_IN_WORDS;
924 
925 	/*
926 	 * These two fields should be zero, and are already set above.
927 	 *
928 	 * sctp->sctp_ipha->ipha_ident,
929 	 * sctp->sctp_ipha->ipha_fragment_offset_and_flags.
930 	 */
931 
932 	sctp->sctp_ipha->ipha_ttl = sctp_ipv4_ttl;
933 	sctp->sctp_ipha->ipha_protocol = IPPROTO_SCTP;
934 
935 	sctph = (sctp_hdr_t *)(sctp->sctp_iphc + sizeof (ipha_t));
936 	sctp->sctp_sctph = sctph;
937 
938 	return (0);
939 }
940 
941 /*
942  * Update sctp_sticky_hdrs based on sctp_sticky_ipp.
943  * The headers include ip6i_t (if needed), ip6_t, any sticky extension
944  * headers, and the maximum size sctp header (to avoid reallocation
945  * on the fly for additional sctp options).
946  * Returns failure if can't allocate memory.
947  */
948 int
949 sctp_build_hdrs(sctp_t *sctp)
950 {
951 	char		*hdrs;
952 	uint_t		hdrs_len;
953 	ip6i_t		*ip6i;
954 	char		buf[SCTP_MAX_HDR_LENGTH];
955 	ip6_pkt_t	*ipp = &sctp->sctp_sticky_ipp;
956 	in6_addr_t	src;
957 	in6_addr_t	dst;
958 
959 	/*
960 	 * save the existing sctp header and source/dest IP addresses
961 	 */
962 	bcopy(sctp->sctp_sctph6, buf, sizeof (sctp_hdr_t));
963 	src = sctp->sctp_ip6h->ip6_src;
964 	dst = sctp->sctp_ip6h->ip6_dst;
965 	hdrs_len = ip_total_hdrs_len_v6(ipp) + SCTP_MAX_HDR_LENGTH;
966 	ASSERT(hdrs_len != 0);
967 	if (hdrs_len > sctp->sctp_iphc6_len) {
968 		/* Need to reallocate */
969 		hdrs = kmem_zalloc(hdrs_len, KM_NOSLEEP);
970 		if (hdrs == NULL)
971 			return (ENOMEM);
972 
973 		if (sctp->sctp_iphc6_len != 0)
974 			kmem_free(sctp->sctp_iphc6, sctp->sctp_iphc6_len);
975 		sctp->sctp_iphc6 = hdrs;
976 		sctp->sctp_iphc6_len = hdrs_len;
977 	}
978 	ip_build_hdrs_v6((uchar_t *)sctp->sctp_iphc6,
979 	    hdrs_len - SCTP_MAX_HDR_LENGTH, ipp, IPPROTO_SCTP);
980 
981 	/* Set header fields not in ipp */
982 	if (ipp->ipp_fields & IPPF_HAS_IP6I) {
983 		ip6i = (ip6i_t *)sctp->sctp_iphc6;
984 		sctp->sctp_ip6h = (ip6_t *)&ip6i[1];
985 	} else {
986 		sctp->sctp_ip6h = (ip6_t *)sctp->sctp_iphc6;
987 	}
988 	/*
989 	 * sctp->sctp_ip_hdr_len will include ip6i_t if there is one.
990 	 */
991 	sctp->sctp_ip_hdr6_len = hdrs_len - SCTP_MAX_HDR_LENGTH;
992 	sctp->sctp_sctph6 = (sctp_hdr_t *)(sctp->sctp_iphc6 +
993 	    sctp->sctp_ip_hdr6_len);
994 	sctp->sctp_hdr6_len = sctp->sctp_ip_hdr6_len + sizeof (sctp_hdr_t);
995 
996 	bcopy(buf, sctp->sctp_sctph6, sizeof (sctp_hdr_t));
997 
998 	sctp->sctp_ip6h->ip6_src = src;
999 	sctp->sctp_ip6h->ip6_dst = dst;
1000 	/*
1001 	 * If the hoplimit was not set by ip_build_hdrs_v6(), we need to
1002 	 * set it to the default value for SCTP.
1003 	 */
1004 	if (!(ipp->ipp_fields & IPPF_UNICAST_HOPS))
1005 		sctp->sctp_ip6h->ip6_hops = sctp_ipv6_hoplimit;
1006 	/*
1007 	 * If we're setting extension headers after a connection
1008 	 * has been established, and if we have a routing header
1009 	 * among the extension headers, call ip_massage_options_v6 to
1010 	 * manipulate the routing header/ip6_dst set the checksum
1011 	 * difference in the sctp header template.
1012 	 * (This happens in sctp_connect_ipv6 if the routing header
1013 	 * is set prior to the connect.)
1014 	 */
1015 
1016 	if ((sctp->sctp_state >= SCTPS_COOKIE_WAIT) &&
1017 	    (sctp->sctp_sticky_ipp.ipp_fields & IPPF_RTHDR)) {
1018 		ip6_rthdr_t *rth;
1019 
1020 		rth = ip_find_rthdr_v6(sctp->sctp_ip6h,
1021 		    (uint8_t *)sctp->sctp_sctph6);
1022 		if (rth != NULL)
1023 			(void) ip_massage_options_v6(sctp->sctp_ip6h, rth);
1024 	}
1025 	return (0);
1026 }
1027 
1028 /*
1029  * Initialize the IPv6 header. Loses any record of any IPv6 extension headers.
1030  */
1031 int
1032 sctp_header_init_ipv6(sctp_t *sctp, int sleep)
1033 {
1034 	sctp_hdr_t	*sctph;
1035 
1036 	/*
1037 	 * This is a simple initialization. If there's
1038 	 * already a template, it should never be too small,
1039 	 * so reuse it. Otherwise, allocate space for the new one.
1040 	 * Ensure that there is enough space to "downgrade" the sctp_t
1041 	 * to an IPv4 sctp_t. This requires having space for a full load
1042 	 * of IPv4 options
1043 	 */
1044 	if (sctp->sctp_iphc6 != NULL) {
1045 		ASSERT(sctp->sctp_iphc6_len >=
1046 		    SCTP_MAX_COMBINED_HEADER_LENGTH);
1047 		bzero(sctp->sctp_iphc6, sctp->sctp_iphc6_len);
1048 	} else {
1049 		sctp->sctp_iphc6_len = SCTP_MAX_COMBINED_HEADER_LENGTH;
1050 		sctp->sctp_iphc6 = kmem_zalloc(sctp->sctp_iphc_len, sleep);
1051 		if (sctp->sctp_iphc6 == NULL) {
1052 			sctp->sctp_iphc6_len = 0;
1053 			return (ENOMEM);
1054 		}
1055 	}
1056 	sctp->sctp_hdr6_len = IPV6_HDR_LEN + sizeof (sctp_hdr_t);
1057 	sctp->sctp_ip_hdr6_len = IPV6_HDR_LEN;
1058 	sctp->sctp_ip6h = (ip6_t *)sctp->sctp_iphc6;
1059 
1060 	/* Initialize the header template */
1061 
1062 	sctp->sctp_ip6h->ip6_vcf = IPV6_DEFAULT_VERS_AND_FLOW;
1063 	sctp->sctp_ip6h->ip6_plen = ntohs(sizeof (sctp_hdr_t));
1064 	sctp->sctp_ip6h->ip6_nxt = IPPROTO_SCTP;
1065 	sctp->sctp_ip6h->ip6_hops = sctp_ipv6_hoplimit;
1066 
1067 	sctph = (sctp_hdr_t *)(sctp->sctp_iphc6 + IPV6_HDR_LEN);
1068 	sctp->sctp_sctph6 = sctph;
1069 
1070 	return (0);
1071 }
1072 
1073 static int
1074 sctp_v4_label(sctp_t *sctp)
1075 {
1076 	uchar_t optbuf[IP_MAX_OPT_LENGTH];
1077 	const cred_t *cr = CONN_CRED(sctp->sctp_connp);
1078 	int added;
1079 
1080 	if (tsol_compute_label(cr, sctp->sctp_ipha->ipha_dst, optbuf,
1081 	    sctp->sctp_mac_exempt) != 0)
1082 		return (EACCES);
1083 
1084 	added = tsol_remove_secopt(sctp->sctp_ipha, sctp->sctp_hdr_len);
1085 	if (added == -1)
1086 		return (EACCES);
1087 	sctp->sctp_hdr_len += added;
1088 	sctp->sctp_sctph = (sctp_hdr_t *)((uchar_t *)sctp->sctp_sctph + added);
1089 	sctp->sctp_ip_hdr_len += added;
1090 	if ((sctp->sctp_v4label_len = optbuf[IPOPT_OLEN]) != 0) {
1091 		sctp->sctp_v4label_len = (sctp->sctp_v4label_len + 3) & ~3;
1092 		added = tsol_prepend_option(optbuf, sctp->sctp_ipha,
1093 		    sctp->sctp_hdr_len);
1094 		if (added == -1)
1095 			return (EACCES);
1096 		sctp->sctp_hdr_len += added;
1097 		sctp->sctp_sctph = (sctp_hdr_t *)((uchar_t *)sctp->sctp_sctph +
1098 		    added);
1099 		sctp->sctp_ip_hdr_len += added;
1100 	}
1101 	return (0);
1102 }
1103 
1104 static int
1105 sctp_v6_label(sctp_t *sctp)
1106 {
1107 	uchar_t optbuf[TSOL_MAX_IPV6_OPTION];
1108 	const cred_t *cr = CONN_CRED(sctp->sctp_connp);
1109 
1110 	if (tsol_compute_label_v6(cr, &sctp->sctp_ip6h->ip6_dst, optbuf,
1111 	    sctp->sctp_mac_exempt) != 0)
1112 		return (EACCES);
1113 	if (tsol_update_sticky(&sctp->sctp_sticky_ipp, &sctp->sctp_v6label_len,
1114 	    optbuf) != 0)
1115 		return (EACCES);
1116 	if (sctp_build_hdrs(sctp) != 0)
1117 		return (EACCES);
1118 	return (0);
1119 }
1120 
1121 /*
1122  * XXX implement more sophisticated logic
1123  */
1124 int
1125 sctp_set_hdraddrs(sctp_t *sctp)
1126 {
1127 	sctp_faddr_t *fp;
1128 	int gotv4 = 0;
1129 	int gotv6 = 0;
1130 
1131 	ASSERT(sctp->sctp_faddrs != NULL);
1132 	ASSERT(sctp->sctp_nsaddrs > 0);
1133 
1134 	/* Set up using the primary first */
1135 	if (IN6_IS_ADDR_V4MAPPED(&sctp->sctp_primary->faddr)) {
1136 		IN6_V4MAPPED_TO_IPADDR(&sctp->sctp_primary->faddr,
1137 		    sctp->sctp_ipha->ipha_dst);
1138 		/* saddr may be unspec; make_mp() will handle this */
1139 		IN6_V4MAPPED_TO_IPADDR(&sctp->sctp_primary->saddr,
1140 		    sctp->sctp_ipha->ipha_src);
1141 		if (!is_system_labeled() || sctp_v4_label(sctp) == 0) {
1142 			gotv4 = 1;
1143 			if (sctp->sctp_ipversion == IPV4_VERSION) {
1144 				goto copyports;
1145 			}
1146 		}
1147 	} else {
1148 		sctp->sctp_ip6h->ip6_dst = sctp->sctp_primary->faddr;
1149 		/* saddr may be unspec; make_mp() will handle this */
1150 		sctp->sctp_ip6h->ip6_src = sctp->sctp_primary->saddr;
1151 		if (!is_system_labeled() || sctp_v6_label(sctp) == 0)
1152 			gotv6 = 1;
1153 	}
1154 
1155 	for (fp = sctp->sctp_faddrs; fp; fp = fp->next) {
1156 		if (!gotv4 && IN6_IS_ADDR_V4MAPPED(&fp->faddr)) {
1157 			IN6_V4MAPPED_TO_IPADDR(&fp->faddr,
1158 			    sctp->sctp_ipha->ipha_dst);
1159 			/* copy in the faddr_t's saddr */
1160 			IN6_V4MAPPED_TO_IPADDR(&fp->saddr,
1161 			    sctp->sctp_ipha->ipha_src);
1162 			if (!is_system_labeled() || sctp_v4_label(sctp) == 0) {
1163 				gotv4 = 1;
1164 				if (sctp->sctp_ipversion == IPV4_VERSION ||
1165 				    gotv6) {
1166 					break;
1167 				}
1168 			}
1169 		} else if (!gotv6 && !IN6_IS_ADDR_V4MAPPED(&fp->faddr)) {
1170 			sctp->sctp_ip6h->ip6_dst = fp->faddr;
1171 			/* copy in the faddr_t's saddr */
1172 			sctp->sctp_ip6h->ip6_src = fp->saddr;
1173 			if (!is_system_labeled() || sctp_v6_label(sctp) == 0) {
1174 				gotv6 = 1;
1175 				if (gotv4)
1176 					break;
1177 			}
1178 		}
1179 	}
1180 
1181 copyports:
1182 	if (!gotv4 && !gotv6)
1183 		return (EACCES);
1184 
1185 	/* copy in the ports for good measure */
1186 	sctp->sctp_sctph->sh_sport = sctp->sctp_lport;
1187 	sctp->sctp_sctph->sh_dport = sctp->sctp_fport;
1188 
1189 	sctp->sctp_sctph6->sh_sport = sctp->sctp_lport;
1190 	sctp->sctp_sctph6->sh_dport = sctp->sctp_fport;
1191 	return (0);
1192 }
1193 
1194 void
1195 sctp_add_unrec_parm(sctp_parm_hdr_t *uph, mblk_t **errmp)
1196 {
1197 	mblk_t *mp;
1198 	sctp_parm_hdr_t *ph;
1199 	size_t len;
1200 	int pad;
1201 
1202 	len = sizeof (*ph) + ntohs(uph->sph_len);
1203 	if ((pad = len % 4) != 0) {
1204 		pad = 4 - pad;
1205 		len += pad;
1206 	}
1207 	mp = allocb(len, BPRI_MED);
1208 	if (mp == NULL) {
1209 		return;
1210 	}
1211 
1212 	ph = (sctp_parm_hdr_t *)(mp->b_rptr);
1213 	ph->sph_type = htons(PARM_UNRECOGNIZED);
1214 	ph->sph_len = htons(len - pad);
1215 
1216 	/* copy in the unrecognized parameter */
1217 	bcopy(uph, ph + 1, ntohs(uph->sph_len));
1218 
1219 	mp->b_wptr = mp->b_rptr + len;
1220 	if (*errmp != NULL) {
1221 		linkb(*errmp, mp);
1222 	} else {
1223 		*errmp = mp;
1224 	}
1225 }
1226 
1227 /*
1228  * o Bounds checking
1229  * o Updates remaining
1230  * o Checks alignment
1231  */
1232 sctp_parm_hdr_t *
1233 sctp_next_parm(sctp_parm_hdr_t *current, ssize_t *remaining)
1234 {
1235 	int pad;
1236 	uint16_t len;
1237 
1238 	len = ntohs(current->sph_len);
1239 	*remaining -= len;
1240 	if (*remaining < sizeof (*current) || len < sizeof (*current)) {
1241 		return (NULL);
1242 	}
1243 	if ((pad = len & (SCTP_ALIGN - 1)) != 0) {
1244 		pad = SCTP_ALIGN - pad;
1245 		*remaining -= pad;
1246 	}
1247 	/*LINTED pointer cast may result in improper alignment*/
1248 	current = (sctp_parm_hdr_t *)((char *)current + len + pad);
1249 	return (current);
1250 }
1251 
1252 /*
1253  * Sets the address parameters given in the INIT chunk into sctp's
1254  * faddrs; if psctp is non-NULL, copies psctp's saddrs. If there are
1255  * no address parameters in the INIT chunk, a single faddr is created
1256  * from the ip hdr at the beginning of pkt.
1257  * If there already are existing addresses hanging from sctp, merge
1258  * them in, if the old info contains addresses which are not present
1259  * in this new info, get rid of them, and clean the pointers if there's
1260  * messages which have this as their target address.
1261  *
1262  * We also re-adjust the source address list here since the list may
1263  * contain more than what is actually part of the association. If
1264  * we get here from sctp_send_cookie_echo(), we are on the active
1265  * side and psctp will be NULL and ich will be the INIT-ACK chunk.
1266  * If we get here from sctp_accept_comm(), ich will be the INIT chunk
1267  * and psctp will the listening endpoint.
1268  *
1269  * INIT processing: When processing the INIT we inherit the src address
1270  * list from the listener. For a loopback or linklocal association, we
1271  * delete the list and just take the address from the IP header (since
1272  * that's how we created the INIT-ACK). Additionally, for loopback we
1273  * ignore the address params in the INIT. For determining which address
1274  * types were sent in the INIT-ACK we follow the same logic as in
1275  * creating the INIT-ACK. We delete addresses of the type that are not
1276  * supported by the peer.
1277  *
1278  * INIT-ACK processing: When processing the INIT-ACK since we had not
1279  * included addr params for loopback or linklocal addresses when creating
1280  * the INIT, we just use the address from the IP header. Further, for
1281  * loopback we ignore the addr param list. We mark addresses of the
1282  * type not supported by the peer as unconfirmed.
1283  *
1284  * In case of INIT processing we look for supported address types in the
1285  * supported address param, if present. In both cases the address type in
1286  * the IP header is supported as well as types for addresses in the param
1287  * list, if any.
1288  *
1289  * Once we have the supported address types sctp_check_saddr() runs through
1290  * the source address list and deletes or marks as unconfirmed address of
1291  * types not supported by the peer.
1292  *
1293  * Returns 0 on success, sys errno on failure
1294  */
1295 int
1296 sctp_get_addrparams(sctp_t *sctp, sctp_t *psctp, mblk_t *pkt,
1297     sctp_chunk_hdr_t *ich, uint_t *sctp_options)
1298 {
1299 	sctp_init_chunk_t	*init;
1300 	ipha_t			*iph;
1301 	ip6_t			*ip6h;
1302 	in6_addr_t		hdrsaddr[1];
1303 	in6_addr_t		hdrdaddr[1];
1304 	sctp_parm_hdr_t		*ph;
1305 	ssize_t			remaining;
1306 	int			isv4;
1307 	int			err;
1308 	sctp_faddr_t		*fp;
1309 	int			supp_af = 0;
1310 	boolean_t		check_saddr = B_TRUE;
1311 	in6_addr_t		curaddr;
1312 
1313 	if (sctp_options != NULL)
1314 		*sctp_options = 0;
1315 
1316 	/* extract the address from the IP header */
1317 	isv4 = (IPH_HDR_VERSION(pkt->b_rptr) == IPV4_VERSION);
1318 	if (isv4) {
1319 		iph = (ipha_t *)pkt->b_rptr;
1320 		IN6_IPADDR_TO_V4MAPPED(iph->ipha_src, hdrsaddr);
1321 		IN6_IPADDR_TO_V4MAPPED(iph->ipha_dst, hdrdaddr);
1322 		supp_af |= PARM_SUPP_V4;
1323 	} else {
1324 		ip6h = (ip6_t *)pkt->b_rptr;
1325 		hdrsaddr[0] = ip6h->ip6_src;
1326 		hdrdaddr[0] = ip6h->ip6_dst;
1327 		supp_af |= PARM_SUPP_V6;
1328 	}
1329 
1330 	/*
1331 	 * Unfortunately, we can't delay this because adding an faddr
1332 	 * looks for the presence of the source address (from the ire
1333 	 * for the faddr) in the source address list. We could have
1334 	 * delayed this if, say, this was a loopback/linklocal connection.
1335 	 * Now, we just end up nuking this list and taking the addr from
1336 	 * the IP header for loopback/linklocal.
1337 	 */
1338 	if (psctp != NULL && psctp->sctp_nsaddrs > 0) {
1339 		ASSERT(sctp->sctp_nsaddrs == 0);
1340 
1341 		err = sctp_dup_saddrs(psctp, sctp, KM_NOSLEEP);
1342 		if (err != 0)
1343 			return (err);
1344 	}
1345 	/*
1346 	 * We will add the faddr before parsing the address list as this
1347 	 * might be a loopback connection and we would not have to
1348 	 * go through the list.
1349 	 *
1350 	 * Make sure the header's addr is in the list
1351 	 */
1352 	fp = sctp_lookup_faddr(sctp, hdrsaddr);
1353 	if (fp == NULL) {
1354 		/* not included; add it now */
1355 		err = sctp_add_faddr(sctp, hdrsaddr, KM_NOSLEEP, B_TRUE);
1356 		if (err != 0)
1357 			return (err);
1358 
1359 		/* sctp_faddrs will be the hdr addr */
1360 		fp = sctp->sctp_faddrs;
1361 	}
1362 	/* make the header addr the primary */
1363 
1364 	if (cl_sctp_assoc_change != NULL && psctp == NULL)
1365 		curaddr = sctp->sctp_current->faddr;
1366 
1367 	sctp->sctp_primary = fp;
1368 	sctp->sctp_current = fp;
1369 	sctp->sctp_mss = fp->sfa_pmss;
1370 
1371 	/* For loopback connections & linklocal get address from the header */
1372 	if (sctp->sctp_loopback || sctp->sctp_linklocal) {
1373 		if (sctp->sctp_nsaddrs != 0)
1374 			sctp_free_saddrs(sctp);
1375 		if ((err = sctp_saddr_add_addr(sctp, hdrdaddr, 0)) != 0)
1376 			return (err);
1377 		/* For loopback ignore address list */
1378 		if (sctp->sctp_loopback)
1379 			return (0);
1380 		check_saddr = B_FALSE;
1381 	}
1382 
1383 	/* Walk the params in the INIT [ACK], pulling out addr params */
1384 	remaining = ntohs(ich->sch_len) - sizeof (*ich) -
1385 	    sizeof (sctp_init_chunk_t);
1386 	if (remaining < sizeof (*ph)) {
1387 		if (check_saddr) {
1388 			sctp_check_saddr(sctp, supp_af, psctp == NULL ?
1389 			    B_FALSE : B_TRUE);
1390 		}
1391 		ASSERT(sctp_saddr_lookup(sctp, hdrdaddr, 0) != NULL);
1392 		return (0);
1393 	}
1394 
1395 	init = (sctp_init_chunk_t *)(ich + 1);
1396 	ph = (sctp_parm_hdr_t *)(init + 1);
1397 
1398 	/* params will have already been byteordered when validating */
1399 	while (ph != NULL) {
1400 		if (ph->sph_type == htons(PARM_SUPP_ADDRS)) {
1401 			int		plen;
1402 			uint16_t	*p;
1403 			uint16_t	addrtype;
1404 
1405 			ASSERT(psctp != NULL);
1406 			plen = ntohs(ph->sph_len);
1407 			p = (uint16_t *)(ph + 1);
1408 			while (plen > 0) {
1409 				addrtype = ntohs(*p);
1410 				switch (addrtype) {
1411 					case PARM_ADDR6:
1412 						supp_af |= PARM_SUPP_V6;
1413 						break;
1414 					case PARM_ADDR4:
1415 						supp_af |= PARM_SUPP_V4;
1416 						break;
1417 					default:
1418 						break;
1419 				}
1420 				p++;
1421 				plen -= sizeof (*p);
1422 			}
1423 		} else if (ph->sph_type == htons(PARM_ADDR4)) {
1424 			if (remaining >= PARM_ADDR4_LEN) {
1425 				in6_addr_t addr;
1426 				ipaddr_t ta;
1427 
1428 				supp_af |= PARM_SUPP_V4;
1429 				/*
1430 				 * Screen out broad/multicasts & loopback.
1431 				 * If the endpoint only accepts v6 address,
1432 				 * go to the next one.
1433 				 */
1434 				bcopy(ph + 1, &ta, sizeof (ta));
1435 				if (ta == 0 ||
1436 				    ta == INADDR_BROADCAST ||
1437 				    ta == htonl(INADDR_LOOPBACK) ||
1438 				    IN_MULTICAST(ta) ||
1439 				    sctp->sctp_connp->conn_ipv6_v6only) {
1440 					goto next;
1441 				}
1442 				/*
1443 				 * XXX also need to check for subnet
1444 				 * broadcasts. This should probably
1445 				 * wait until we have full access
1446 				 * to the ILL tables.
1447 				 */
1448 
1449 				IN6_INADDR_TO_V4MAPPED((struct in_addr *)
1450 				    (ph + 1), &addr);
1451 				/* Check for duplicate. */
1452 				if (sctp_lookup_faddr(sctp, &addr) != NULL)
1453 					goto next;
1454 
1455 				/* OK, add it to the faddr set */
1456 				err = sctp_add_faddr(sctp, &addr, KM_NOSLEEP,
1457 				    B_FALSE);
1458 				if (err != 0)
1459 					return (err);
1460 			}
1461 		} else if (ph->sph_type == htons(PARM_ADDR6) &&
1462 		    sctp->sctp_family == AF_INET6) {
1463 			/* An v4 socket should not take v6 addresses. */
1464 			if (remaining >= PARM_ADDR6_LEN) {
1465 				in6_addr_t *addr6;
1466 
1467 				supp_af |= PARM_SUPP_V6;
1468 				addr6 = (in6_addr_t *)(ph + 1);
1469 				/*
1470 				 * Screen out link locals, mcast, loopback
1471 				 * and bogus v6 address.
1472 				 */
1473 				if (IN6_IS_ADDR_LINKLOCAL(addr6) ||
1474 				    IN6_IS_ADDR_MULTICAST(addr6) ||
1475 				    IN6_IS_ADDR_LOOPBACK(addr6) ||
1476 				    IN6_IS_ADDR_V4MAPPED(addr6)) {
1477 					goto next;
1478 				}
1479 				/* Check for duplicate. */
1480 				if (sctp_lookup_faddr(sctp, addr6) != NULL)
1481 					goto next;
1482 
1483 				err = sctp_add_faddr(sctp,
1484 				    (in6_addr_t *)(ph + 1), KM_NOSLEEP,
1485 				    B_FALSE);
1486 				if (err != 0)
1487 					return (err);
1488 			}
1489 		} else if (ph->sph_type == htons(PARM_FORWARD_TSN)) {
1490 			if (sctp_options != NULL)
1491 				*sctp_options |= SCTP_PRSCTP_OPTION;
1492 		} /* else; skip */
1493 
1494 next:
1495 		ph = sctp_next_parm(ph, &remaining);
1496 	}
1497 	if (check_saddr) {
1498 		sctp_check_saddr(sctp, supp_af, psctp == NULL ? B_FALSE :
1499 		    B_TRUE);
1500 	}
1501 	ASSERT(sctp_saddr_lookup(sctp, hdrdaddr, 0) != NULL);
1502 	/*
1503 	 * We have the right address list now, update clustering's
1504 	 * knowledge because when we sent the INIT we had just added
1505 	 * the address the INIT was sent to.
1506 	 */
1507 	if (psctp == NULL && cl_sctp_assoc_change != NULL) {
1508 		uchar_t	*alist;
1509 		size_t	asize;
1510 		uchar_t	*dlist;
1511 		size_t	dsize;
1512 
1513 		asize = sizeof (in6_addr_t) * sctp->sctp_nfaddrs;
1514 		alist = kmem_alloc(asize, KM_NOSLEEP);
1515 		if (alist == NULL) {
1516 			SCTP_KSTAT(sctp_cl_assoc_change);
1517 			return (ENOMEM);
1518 		}
1519 		/*
1520 		 * Just include the address the INIT was sent to in the
1521 		 * delete list and send the entire faddr list. We could
1522 		 * do it differently (i.e include all the addresses in the
1523 		 * add list even if it contains the original address OR
1524 		 * remove the original address from the add list etc.), but
1525 		 * this seems reasonable enough.
1526 		 */
1527 		dsize = sizeof (in6_addr_t);
1528 		dlist = kmem_alloc(dsize, KM_NOSLEEP);
1529 		if (dlist == NULL) {
1530 			kmem_free(alist, asize);
1531 			SCTP_KSTAT(sctp_cl_assoc_change);
1532 			return (ENOMEM);
1533 		}
1534 		bcopy(&curaddr, dlist, sizeof (curaddr));
1535 		sctp_get_faddr_list(sctp, alist, asize);
1536 		(*cl_sctp_assoc_change)(sctp->sctp_family, alist, asize,
1537 		    sctp->sctp_nfaddrs, dlist, dsize, 1, SCTP_CL_PADDR,
1538 		    (cl_sctp_handle_t)sctp);
1539 		/* alist and dlist will be freed by the clustering module */
1540 	}
1541 	return (0);
1542 }
1543 
1544 /*
1545  * Returns 0 if the check failed and the restart should be refused,
1546  * 1 if the check succeeded.
1547  */
1548 int
1549 sctp_secure_restart_check(mblk_t *pkt, sctp_chunk_hdr_t *ich, uint32_t ports,
1550     int sleep)
1551 {
1552 	sctp_faddr_t *fp, *fpa, *fphead = NULL;
1553 	sctp_parm_hdr_t *ph;
1554 	ssize_t remaining;
1555 	int isv4;
1556 	ipha_t *iph;
1557 	ip6_t *ip6h;
1558 	in6_addr_t hdraddr[1];
1559 	int retval = 0;
1560 	sctp_tf_t *tf;
1561 	sctp_t *sctp;
1562 	int compres;
1563 	sctp_init_chunk_t *init;
1564 	int nadded = 0;
1565 
1566 	/* extract the address from the IP header */
1567 	isv4 = (IPH_HDR_VERSION(pkt->b_rptr) == IPV4_VERSION);
1568 	if (isv4) {
1569 		iph = (ipha_t *)pkt->b_rptr;
1570 		IN6_IPADDR_TO_V4MAPPED(iph->ipha_src, hdraddr);
1571 	} else {
1572 		ip6h = (ip6_t *)pkt->b_rptr;
1573 		hdraddr[0] = ip6h->ip6_src;
1574 	}
1575 
1576 	/* Walk the params in the INIT [ACK], pulling out addr params */
1577 	remaining = ntohs(ich->sch_len) - sizeof (*ich) -
1578 	    sizeof (sctp_init_chunk_t);
1579 	if (remaining < sizeof (*ph)) {
1580 		/* no parameters; restart OK */
1581 		return (1);
1582 	}
1583 	init = (sctp_init_chunk_t *)(ich + 1);
1584 	ph = (sctp_parm_hdr_t *)(init + 1);
1585 
1586 	while (ph != NULL) {
1587 		/* params will have already been byteordered when validating */
1588 		if (ph->sph_type == htons(PARM_ADDR4)) {
1589 			if (remaining >= PARM_ADDR4_LEN) {
1590 				in6_addr_t addr;
1591 				IN6_INADDR_TO_V4MAPPED((struct in_addr *)
1592 				    (ph + 1), &addr);
1593 				fpa = kmem_cache_alloc(sctp_kmem_faddr_cache,
1594 				    sleep);
1595 				if (!fpa) {
1596 					goto done;
1597 				}
1598 				bzero(fpa, sizeof (*fpa));
1599 				fpa->faddr = addr;
1600 				fpa->next = NULL;
1601 			}
1602 		} else if (ph->sph_type == htons(PARM_ADDR6)) {
1603 			if (remaining >= PARM_ADDR6_LEN) {
1604 				fpa = kmem_cache_alloc(sctp_kmem_faddr_cache,
1605 				    sleep);
1606 				if (!fpa) {
1607 					goto done;
1608 				}
1609 				bzero(fpa, sizeof (*fpa));
1610 				bcopy(ph + 1, &fpa->faddr,
1611 				    sizeof (fpa->faddr));
1612 				fpa->next = NULL;
1613 			}
1614 		} else {
1615 			/* else not addr param; skip */
1616 			fpa = NULL;
1617 		}
1618 		/* link in the new addr, if it was an addr param */
1619 		if (fpa) {
1620 			if (!fphead) {
1621 				fphead = fpa;
1622 				fp = fphead;
1623 			} else {
1624 				fp->next = fpa;
1625 				fp = fpa;
1626 			}
1627 		}
1628 
1629 		ph = sctp_next_parm(ph, &remaining);
1630 	}
1631 
1632 	if (fphead == NULL) {
1633 		/* no addr parameters; restart OK */
1634 		return (1);
1635 	}
1636 
1637 	/*
1638 	 * got at least one; make sure the header's addr is
1639 	 * in the list
1640 	 */
1641 	fp = sctp_lookup_faddr_nosctp(fphead, hdraddr);
1642 	if (!fp) {
1643 		/* not included; add it now */
1644 		fp = kmem_cache_alloc(sctp_kmem_faddr_cache, sleep);
1645 		if (!fp) {
1646 			goto done;
1647 		}
1648 		bzero(fp, sizeof (*fp));
1649 		fp->faddr = *hdraddr;
1650 		fp->next = fphead;
1651 		fphead = fp;
1652 	}
1653 
1654 	/*
1655 	 * Now, we can finally do the check: For each sctp instance
1656 	 * on the hash line for ports, compare its faddr set against
1657 	 * the new one. If the new one is a strict subset of any
1658 	 * existing sctp's faddrs, the restart is OK. However, if there
1659 	 * is an overlap, this could be an attack, so return failure.
1660 	 * If all sctp's faddrs are disjoint, this is a legitimate new
1661 	 * association.
1662 	 */
1663 	tf = &(sctp_conn_fanout[SCTP_CONN_HASH(ports)]);
1664 	mutex_enter(&tf->tf_lock);
1665 
1666 	for (sctp = tf->tf_sctp; sctp; sctp = sctp->sctp_conn_hash_next) {
1667 		if (ports != sctp->sctp_ports) {
1668 			continue;
1669 		}
1670 		compres = sctp_compare_faddrsets(fphead, sctp->sctp_faddrs);
1671 		if (compres <= SCTP_ADDR_SUBSET) {
1672 			retval = 1;
1673 			mutex_exit(&tf->tf_lock);
1674 			goto done;
1675 		}
1676 		if (compres == SCTP_ADDR_OVERLAP) {
1677 			dprint(1,
1678 			    ("new assoc from %x:%x:%x:%x overlaps with %p\n",
1679 			    SCTP_PRINTADDR(*hdraddr), (void *)sctp));
1680 			/*
1681 			 * While we still hold the lock, we need to
1682 			 * figure out which addresses have been
1683 			 * added so we can include them in the abort
1684 			 * we will send back. Since these faddrs will
1685 			 * never be used, we overload the rto field
1686 			 * here, setting it to 0 if the address was
1687 			 * not added, 1 if it was added.
1688 			 */
1689 			for (fp = fphead; fp; fp = fp->next) {
1690 				if (sctp_lookup_faddr(sctp, &fp->faddr)) {
1691 					fp->rto = 0;
1692 				} else {
1693 					fp->rto = 1;
1694 					nadded++;
1695 				}
1696 			}
1697 			mutex_exit(&tf->tf_lock);
1698 			goto done;
1699 		}
1700 	}
1701 	mutex_exit(&tf->tf_lock);
1702 
1703 	/* All faddrs are disjoint; legit new association */
1704 	retval = 1;
1705 
1706 done:
1707 	/* If are attempted adds, send back an abort listing the addrs */
1708 	if (nadded > 0) {
1709 		void *dtail;
1710 		size_t dlen;
1711 
1712 		dtail = kmem_alloc(PARM_ADDR6_LEN * nadded, KM_NOSLEEP);
1713 		if (dtail == NULL) {
1714 			goto cleanup;
1715 		}
1716 
1717 		ph = dtail;
1718 		dlen = 0;
1719 		for (fp = fphead; fp; fp = fp->next) {
1720 			if (fp->rto == 0) {
1721 				continue;
1722 			}
1723 			if (IN6_IS_ADDR_V4MAPPED(&fp->faddr)) {
1724 				ipaddr_t addr4;
1725 
1726 				ph->sph_type = htons(PARM_ADDR4);
1727 				ph->sph_len = htons(PARM_ADDR4_LEN);
1728 				IN6_V4MAPPED_TO_IPADDR(&fp->faddr, addr4);
1729 				ph++;
1730 				bcopy(&addr4, ph, sizeof (addr4));
1731 				ph = (sctp_parm_hdr_t *)
1732 				    ((char *)ph + sizeof (addr4));
1733 				dlen += PARM_ADDR4_LEN;
1734 			} else {
1735 				ph->sph_type = htons(PARM_ADDR6);
1736 				ph->sph_len = htons(PARM_ADDR6_LEN);
1737 				ph++;
1738 				bcopy(&fp->faddr, ph, sizeof (fp->faddr));
1739 				ph = (sctp_parm_hdr_t *)
1740 				    ((char *)ph + sizeof (fp->faddr));
1741 				dlen += PARM_ADDR6_LEN;
1742 			}
1743 		}
1744 
1745 		/* Send off the abort */
1746 		sctp_send_abort(sctp, sctp_init2vtag(ich),
1747 		    SCTP_ERR_RESTART_NEW_ADDRS, dtail, dlen, pkt, 0, B_TRUE);
1748 
1749 		kmem_free(dtail, PARM_ADDR6_LEN * nadded);
1750 	}
1751 
1752 cleanup:
1753 	/* Clean up */
1754 	if (fphead) {
1755 		sctp_faddr_t *fpn;
1756 		for (fp = fphead; fp; fp = fpn) {
1757 			fpn = fp->next;
1758 			kmem_cache_free(sctp_kmem_faddr_cache, fp);
1759 		}
1760 	}
1761 
1762 	return (retval);
1763 }
1764 
1765 /*
1766  * Reset any state related to transmitted chunks.
1767  */
1768 void
1769 sctp_congest_reset(sctp_t *sctp)
1770 {
1771 	sctp_faddr_t	*fp;
1772 	mblk_t		*mp;
1773 
1774 	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
1775 		fp->ssthresh = sctp_initial_mtu;
1776 		fp->cwnd = fp->sfa_pmss * sctp_slow_start_initial;
1777 		fp->suna = 0;
1778 		fp->pba = 0;
1779 	}
1780 	/*
1781 	 * Clean up the transmit list as well since we have reset accounting
1782 	 * on all the fps. Send event upstream, if required.
1783 	 */
1784 	while ((mp = sctp->sctp_xmit_head) != NULL) {
1785 		sctp->sctp_xmit_head = mp->b_next;
1786 		mp->b_next = NULL;
1787 		if (sctp->sctp_xmit_head != NULL)
1788 			sctp->sctp_xmit_head->b_prev = NULL;
1789 		sctp_sendfail_event(sctp, mp, 0, B_TRUE);
1790 	}
1791 	sctp->sctp_xmit_head = NULL;
1792 	sctp->sctp_xmit_tail = NULL;
1793 	sctp->sctp_xmit_unacked = NULL;
1794 
1795 	sctp->sctp_unacked = 0;
1796 	/*
1797 	 * Any control message as well. We will clean-up this list as well.
1798 	 * This contains any pending ASCONF request that we have queued/sent.
1799 	 * If we do get an ACK we will just drop it. However, given that
1800 	 * we are restarting chances are we aren't going to get any.
1801 	 */
1802 	if (sctp->sctp_cxmit_list != NULL)
1803 		sctp_asconf_free_cxmit(sctp, NULL);
1804 	sctp->sctp_cxmit_list = NULL;
1805 	sctp->sctp_cchunk_pend = 0;
1806 
1807 	sctp->sctp_rexmitting = B_FALSE;
1808 	sctp->sctp_rxt_nxttsn = 0;
1809 	sctp->sctp_rxt_maxtsn = 0;
1810 
1811 	sctp->sctp_zero_win_probe = B_FALSE;
1812 }
1813 
1814 static void
1815 sctp_init_faddr(sctp_t *sctp, sctp_faddr_t *fp, in6_addr_t *addr,
1816     mblk_t *timer_mp)
1817 {
1818 	bcopy(addr, &fp->faddr, sizeof (*addr));
1819 	if (IN6_IS_ADDR_V4MAPPED(addr)) {
1820 		fp->isv4 = 1;
1821 		/* Make sure that sfa_pmss is a multiple of SCTP_ALIGN. */
1822 		fp->sfa_pmss = (sctp_initial_mtu - sctp->sctp_hdr_len) &
1823 			~(SCTP_ALIGN - 1);
1824 	} else {
1825 		fp->isv4 = 0;
1826 		fp->sfa_pmss = (sctp_initial_mtu - sctp->sctp_hdr6_len) &
1827 			~(SCTP_ALIGN - 1);
1828 	}
1829 	fp->cwnd = sctp_slow_start_initial * fp->sfa_pmss;
1830 	fp->rto = MIN(sctp->sctp_rto_initial, sctp->sctp_init_rto_max);
1831 	fp->srtt = -1;
1832 	fp->rtt_updates = 0;
1833 	fp->strikes = 0;
1834 	fp->max_retr = sctp->sctp_pp_max_rxt;
1835 	/* Mark it as not confirmed. */
1836 	fp->state = SCTP_FADDRS_UNCONFIRMED;
1837 	fp->hb_interval = sctp->sctp_hb_interval;
1838 	fp->ssthresh = sctp_initial_ssthresh;
1839 	fp->suna = 0;
1840 	fp->pba = 0;
1841 	fp->acked = 0;
1842 	fp->lastactive = lbolt64;
1843 	fp->timer_mp = timer_mp;
1844 	fp->hb_pending = B_FALSE;
1845 	fp->timer_running = 0;
1846 	fp->df = 1;
1847 	fp->pmtu_discovered = 0;
1848 	fp->rc_timer_mp = NULL;
1849 	fp->rc_timer_running = 0;
1850 	fp->next = NULL;
1851 	fp->ire = NULL;
1852 	fp->T3expire = 0;
1853 	(void) random_get_pseudo_bytes((uint8_t *)&fp->hb_secret,
1854 	    sizeof (fp->hb_secret));
1855 	fp->hb_expiry = lbolt64;
1856 
1857 	sctp_get_ire(sctp, fp);
1858 }
1859 
1860 /*ARGSUSED*/
1861 static void
1862 faddr_destructor(void *buf, void *cdrarg)
1863 {
1864 	sctp_faddr_t *fp = buf;
1865 
1866 	ASSERT(fp->timer_mp == NULL);
1867 	ASSERT(fp->timer_running == 0);
1868 
1869 	ASSERT(fp->rc_timer_mp == NULL);
1870 	ASSERT(fp->rc_timer_running == 0);
1871 }
1872 
1873 void
1874 sctp_faddr_init(void)
1875 {
1876 	sctp_kmem_faddr_cache = kmem_cache_create("sctp_faddr_cache",
1877 	    sizeof (sctp_faddr_t), 0, NULL, faddr_destructor,
1878 	    NULL, NULL, NULL, 0);
1879 }
1880 
1881 void
1882 sctp_faddr_fini(void)
1883 {
1884 	kmem_cache_destroy(sctp_kmem_faddr_cache);
1885 }
1886