xref: /illumos-gate/usr/src/uts/common/inet/sctp/sctp_common.c (revision 46b592853d0f4f11781b6b0a7533f267c6aee132)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 #include <sys/types.h>
28 #include <sys/systm.h>
29 #include <sys/stream.h>
30 #include <sys/strsubr.h>
31 #include <sys/ddi.h>
32 #include <sys/sunddi.h>
33 #include <sys/kmem.h>
34 #include <sys/socket.h>
35 #include <sys/random.h>
36 #include <sys/tsol/tndb.h>
37 #include <sys/tsol/tnet.h>
38 
39 #include <netinet/in.h>
40 #include <netinet/ip6.h>
41 #include <netinet/sctp.h>
42 
43 #include <inet/common.h>
44 #include <inet/ip.h>
45 #include <inet/ip6.h>
46 #include <inet/ip_ire.h>
47 #include <inet/mib2.h>
48 #include <inet/nd.h>
49 #include <inet/optcom.h>
50 #include <inet/sctp_ip.h>
51 #include <inet/ipclassifier.h>
52 
53 #include "sctp_impl.h"
54 #include "sctp_addr.h"
55 #include "sctp_asconf.h"
56 
57 static struct kmem_cache *sctp_kmem_faddr_cache;
58 static void sctp_init_faddr(sctp_t *, sctp_faddr_t *, in6_addr_t *, mblk_t *);
59 
60 /* Set the source address.  Refer to comments in sctp_get_ire(). */
61 void
62 sctp_set_saddr(sctp_t *sctp, sctp_faddr_t *fp)
63 {
64 	boolean_t v6 = !fp->isv4;
65 	boolean_t addr_set;
66 
67 	fp->saddr = sctp_get_valid_addr(sctp, v6, &addr_set);
68 	/*
69 	 * If there is no source address avaialble, mark this peer address
70 	 * as unreachable for now.  When the heartbeat timer fires, it will
71 	 * call sctp_get_ire() to re-check if there is any source address
72 	 * available.
73 	 */
74 	if (!addr_set)
75 		fp->state = SCTP_FADDRS_UNREACH;
76 }
77 
78 /*
79  * Call this function to update the cached IRE of a peer addr fp.
80  */
81 void
82 sctp_get_ire(sctp_t *sctp, sctp_faddr_t *fp)
83 {
84 	ire_t		*ire;
85 	ipaddr_t	addr4;
86 	in6_addr_t	laddr;
87 	sctp_saddr_ipif_t *sp;
88 	int		hdrlen;
89 	ts_label_t	*tsl;
90 	sctp_stack_t	*sctps = sctp->sctp_sctps;
91 	ip_stack_t	*ipst = sctps->sctps_netstack->netstack_ip;
92 
93 	/* Remove the previous cache IRE */
94 	if ((ire = fp->ire) != NULL) {
95 		IRE_REFRELE_NOTR(ire);
96 		fp->ire = NULL;
97 	}
98 
99 	/*
100 	 * If this addr is not reachable, mark it as unconfirmed for now, the
101 	 * state will be changed back to unreachable later in this function
102 	 * if it is still the case.
103 	 */
104 	if (fp->state == SCTP_FADDRS_UNREACH) {
105 		fp->state = SCTP_FADDRS_UNCONFIRMED;
106 	}
107 
108 	tsl = crgetlabel(CONN_CRED(sctp->sctp_connp));
109 
110 	if (fp->isv4) {
111 		IN6_V4MAPPED_TO_IPADDR(&fp->faddr, addr4);
112 		ire = ire_cache_lookup(addr4, sctp->sctp_zoneid, tsl, ipst);
113 		if (ire != NULL)
114 			IN6_IPADDR_TO_V4MAPPED(ire->ire_src_addr, &laddr);
115 	} else {
116 		ire = ire_cache_lookup_v6(&fp->faddr, sctp->sctp_zoneid, tsl,
117 		    ipst);
118 		if (ire != NULL)
119 			laddr = ire->ire_src_addr_v6;
120 	}
121 
122 	if (ire == NULL) {
123 		dprint(3, ("ire2faddr: no ire for %x:%x:%x:%x\n",
124 		    SCTP_PRINTADDR(fp->faddr)));
125 		/*
126 		 * It is tempting to just leave the src addr
127 		 * unspecified and let IP figure it out, but we
128 		 * *cannot* do this, since IP may choose a src addr
129 		 * that is not part of this association... unless
130 		 * this sctp has bound to all addrs.  So if the ire
131 		 * lookup fails, try to find one in our src addr
132 		 * list, unless the sctp has bound to all addrs, in
133 		 * which case we change the src addr to unspec.
134 		 *
135 		 * Note that if this is a v6 endpoint but it does
136 		 * not have any v4 address at this point (e.g. may
137 		 * have been  deleted), sctp_get_valid_addr() will
138 		 * return mapped INADDR_ANY.  In this case, this
139 		 * address should be marked not reachable so that
140 		 * it won't be used to send data.
141 		 */
142 		sctp_set_saddr(sctp, fp);
143 		if (fp->state == SCTP_FADDRS_UNREACH)
144 			return;
145 		goto check_current;
146 	}
147 
148 	/* Make sure the laddr is part of this association */
149 	if ((sp = sctp_saddr_lookup(sctp, &ire->ire_ipif->ipif_v6lcl_addr,
150 	    0)) != NULL && !sp->saddr_ipif_dontsrc) {
151 		if (sp->saddr_ipif_unconfirmed == 1)
152 			sp->saddr_ipif_unconfirmed = 0;
153 		fp->saddr = laddr;
154 	} else {
155 		dprint(2, ("ire2faddr: src addr is not part of assc\n"));
156 
157 		/*
158 		 * Set the src to the first saddr and hope for the best.
159 		 * Note that we will still do the ire caching below.
160 		 * Otherwise, whenever we send a packet, we need to do
161 		 * the ire lookup again and still may not get the correct
162 		 * source address.  Note that this case should very seldomly
163 		 * happen.  One scenario this can happen is an app
164 		 * explicitly bind() to an address.  But that address is
165 		 * not the preferred source address to send to the peer.
166 		 */
167 		sctp_set_saddr(sctp, fp);
168 		if (fp->state == SCTP_FADDRS_UNREACH) {
169 			IRE_REFRELE(ire);
170 			return;
171 		}
172 	}
173 
174 	/*
175 	 * Note that ire_cache_lookup_*() returns an ire with the tracing
176 	 * bits enabled.  This requires the thread holding the ire also
177 	 * do the IRE_REFRELE().  Thus we need to do IRE_REFHOLD_NOTR()
178 	 * and then IRE_REFRELE() the ire here to make the tracing bits
179 	 * work.
180 	 */
181 	IRE_REFHOLD_NOTR(ire);
182 	IRE_REFRELE(ire);
183 
184 	/* Cache the IRE */
185 	fp->ire = ire;
186 	if (fp->ire->ire_type == IRE_LOOPBACK && !sctp->sctp_loopback)
187 		sctp->sctp_loopback = 1;
188 
189 	/*
190 	 * Pull out RTO information for this faddr and use it if we don't
191 	 * have any yet.
192 	 */
193 	if (fp->srtt == -1 && ire->ire_uinfo.iulp_rtt != 0) {
194 		/* The cached value is in ms. */
195 		fp->srtt = MSEC_TO_TICK(ire->ire_uinfo.iulp_rtt);
196 		fp->rttvar = MSEC_TO_TICK(ire->ire_uinfo.iulp_rtt_sd);
197 		fp->rto = 3 * fp->srtt;
198 
199 		/* Bound the RTO by configured min and max values */
200 		if (fp->rto < sctp->sctp_rto_min) {
201 			fp->rto = sctp->sctp_rto_min;
202 		}
203 		if (fp->rto > sctp->sctp_rto_max) {
204 			fp->rto = sctp->sctp_rto_max;
205 		}
206 		SCTP_MAX_RTO(sctp, fp);
207 	}
208 
209 	/*
210 	 * Record the MTU for this faddr. If the MTU for this faddr has
211 	 * changed, check if the assc MTU will also change.
212 	 */
213 	if (fp->isv4) {
214 		hdrlen = sctp->sctp_hdr_len;
215 	} else {
216 		hdrlen = sctp->sctp_hdr6_len;
217 	}
218 	if ((fp->sfa_pmss + hdrlen) != ire->ire_max_frag) {
219 		/* Make sure that sfa_pmss is a multiple of SCTP_ALIGN. */
220 		fp->sfa_pmss = (ire->ire_max_frag - hdrlen) & ~(SCTP_ALIGN - 1);
221 		if (fp->cwnd < (fp->sfa_pmss * 2)) {
222 			SET_CWND(fp, fp->sfa_pmss,
223 			    sctps->sctps_slow_start_initial);
224 		}
225 	}
226 
227 check_current:
228 	if (fp == sctp->sctp_current)
229 		sctp_set_faddr_current(sctp, fp);
230 }
231 
232 void
233 sctp_update_ire(sctp_t *sctp)
234 {
235 	ire_t		*ire;
236 	sctp_faddr_t	*fp;
237 	sctp_stack_t	*sctps = sctp->sctp_sctps;
238 
239 	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
240 		if ((ire = fp->ire) == NULL)
241 			continue;
242 		mutex_enter(&ire->ire_lock);
243 
244 		/*
245 		 * If the cached IRE is going away, there is no point to
246 		 * update it.
247 		 */
248 		if (ire->ire_marks & IRE_MARK_CONDEMNED) {
249 			mutex_exit(&ire->ire_lock);
250 			IRE_REFRELE_NOTR(ire);
251 			fp->ire = NULL;
252 			continue;
253 		}
254 
255 		/*
256 		 * Only record the PMTU for this faddr if we actually have
257 		 * done discovery. This prevents initialized default from
258 		 * clobbering any real info that IP may have.
259 		 */
260 		if (fp->pmtu_discovered) {
261 			if (fp->isv4) {
262 				ire->ire_max_frag = fp->sfa_pmss +
263 				    sctp->sctp_hdr_len;
264 			} else {
265 				ire->ire_max_frag = fp->sfa_pmss +
266 				    sctp->sctp_hdr6_len;
267 			}
268 		}
269 
270 		if (sctps->sctps_rtt_updates != 0 &&
271 		    fp->rtt_updates >= sctps->sctps_rtt_updates) {
272 			/*
273 			 * If there is no old cached values, initialize them
274 			 * conservatively.  Set them to be (1.5 * new value).
275 			 * This code copied from ip_ire_advise().  The cached
276 			 * value is in ms.
277 			 */
278 			if (ire->ire_uinfo.iulp_rtt != 0) {
279 				ire->ire_uinfo.iulp_rtt =
280 				    (ire->ire_uinfo.iulp_rtt +
281 				    TICK_TO_MSEC(fp->srtt)) >> 1;
282 			} else {
283 				ire->ire_uinfo.iulp_rtt =
284 				    TICK_TO_MSEC(fp->srtt + (fp->srtt >> 1));
285 			}
286 			if (ire->ire_uinfo.iulp_rtt_sd != 0) {
287 				ire->ire_uinfo.iulp_rtt_sd =
288 				    (ire->ire_uinfo.iulp_rtt_sd +
289 				    TICK_TO_MSEC(fp->rttvar)) >> 1;
290 			} else {
291 				ire->ire_uinfo.iulp_rtt_sd =
292 				    TICK_TO_MSEC(fp->rttvar +
293 				    (fp->rttvar >> 1));
294 			}
295 			fp->rtt_updates = 0;
296 		}
297 		mutex_exit(&ire->ire_lock);
298 	}
299 }
300 
301 /*
302  * The sender must set the total length in the IP header.
303  * If sendto == NULL, the current will be used.
304  */
305 mblk_t *
306 sctp_make_mp(sctp_t *sctp, sctp_faddr_t *sendto, int trailer)
307 {
308 	mblk_t *mp;
309 	size_t ipsctplen;
310 	int isv4;
311 	sctp_faddr_t *fp;
312 	sctp_stack_t *sctps = sctp->sctp_sctps;
313 	boolean_t src_changed = B_FALSE;
314 
315 	ASSERT(sctp->sctp_current != NULL || sendto != NULL);
316 	if (sendto == NULL) {
317 		fp = sctp->sctp_current;
318 	} else {
319 		fp = sendto;
320 	}
321 	isv4 = fp->isv4;
322 
323 	/* Try to look for another IRE again. */
324 	if (fp->ire == NULL) {
325 		sctp_get_ire(sctp, fp);
326 		/*
327 		 * Although we still may not get an IRE, the source address
328 		 * may be changed in sctp_get_ire().  Set src_changed to
329 		 * true so that the source address is copied again.
330 		 */
331 		src_changed = B_TRUE;
332 	}
333 
334 	/* There is no suitable source address to use, return. */
335 	if (fp->state == SCTP_FADDRS_UNREACH)
336 		return (NULL);
337 	ASSERT(!SCTP_IS_ADDR_UNSPEC(fp->isv4, fp->saddr));
338 
339 	if (isv4) {
340 		ipsctplen = sctp->sctp_hdr_len;
341 	} else {
342 		ipsctplen = sctp->sctp_hdr6_len;
343 	}
344 
345 	mp = allocb_cred(ipsctplen + sctps->sctps_wroff_xtra + trailer,
346 	    CONN_CRED(sctp->sctp_connp), sctp->sctp_cpid);
347 	if (mp == NULL) {
348 		ip1dbg(("sctp_make_mp: error making mp..\n"));
349 		return (NULL);
350 	}
351 	mp->b_rptr += sctps->sctps_wroff_xtra;
352 	mp->b_wptr = mp->b_rptr + ipsctplen;
353 
354 	ASSERT(OK_32PTR(mp->b_wptr));
355 
356 	if (isv4) {
357 		ipha_t *iph = (ipha_t *)mp->b_rptr;
358 
359 		bcopy(sctp->sctp_iphc, mp->b_rptr, ipsctplen);
360 		if (fp != sctp->sctp_current || src_changed) {
361 			/* Fix the source and destination addresses. */
362 			IN6_V4MAPPED_TO_IPADDR(&fp->faddr, iph->ipha_dst);
363 			IN6_V4MAPPED_TO_IPADDR(&fp->saddr, iph->ipha_src);
364 		}
365 		/* set or clear the don't fragment bit */
366 		if (fp->df) {
367 			iph->ipha_fragment_offset_and_flags = htons(IPH_DF);
368 		} else {
369 			iph->ipha_fragment_offset_and_flags = 0;
370 		}
371 	} else {
372 		bcopy(sctp->sctp_iphc6, mp->b_rptr, ipsctplen);
373 		if (fp != sctp->sctp_current || src_changed) {
374 			/* Fix the source and destination addresses. */
375 			((ip6_t *)(mp->b_rptr))->ip6_dst = fp->faddr;
376 			((ip6_t *)(mp->b_rptr))->ip6_src = fp->saddr;
377 		}
378 	}
379 	ASSERT(sctp->sctp_connp != NULL);
380 
381 	/*
382 	 * IP will not free this IRE if it is condemned.  SCTP needs to
383 	 * free it.
384 	 */
385 	if ((fp->ire != NULL) && (fp->ire->ire_marks & IRE_MARK_CONDEMNED)) {
386 		IRE_REFRELE_NOTR(fp->ire);
387 		fp->ire = NULL;
388 	}
389 	/* Stash the conn and ire ptr info. for IP */
390 	SCTP_STASH_IPINFO(mp, fp->ire);
391 
392 	return (mp);
393 }
394 
395 /*
396  * Notify upper layers about preferred write offset, write size.
397  */
398 void
399 sctp_set_ulp_prop(sctp_t *sctp)
400 {
401 	int hdrlen;
402 	struct sock_proto_props sopp;
403 
404 	sctp_stack_t *sctps = sctp->sctp_sctps;
405 
406 	if (sctp->sctp_current->isv4) {
407 		hdrlen = sctp->sctp_hdr_len;
408 	} else {
409 		hdrlen = sctp->sctp_hdr6_len;
410 	}
411 	ASSERT(sctp->sctp_ulpd);
412 
413 	ASSERT(sctp->sctp_current->sfa_pmss == sctp->sctp_mss);
414 	bzero(&sopp, sizeof (sopp));
415 	sopp.sopp_flags = SOCKOPT_MAXBLK|SOCKOPT_WROFF;
416 	sopp.sopp_wroff = sctps->sctps_wroff_xtra + hdrlen +
417 	    sizeof (sctp_data_hdr_t);
418 	sopp.sopp_maxblk = sctp->sctp_mss - sizeof (sctp_data_hdr_t);
419 	sctp->sctp_ulp_prop(sctp->sctp_ulpd, &sopp);
420 }
421 
422 void
423 sctp_set_iplen(sctp_t *sctp, mblk_t *mp)
424 {
425 	uint16_t	sum = 0;
426 	ipha_t		*iph;
427 	ip6_t		*ip6h;
428 	mblk_t		*pmp = mp;
429 	boolean_t	isv4;
430 
431 	isv4 = (IPH_HDR_VERSION(mp->b_rptr) == IPV4_VERSION);
432 	for (; pmp; pmp = pmp->b_cont)
433 		sum += pmp->b_wptr - pmp->b_rptr;
434 
435 	if (isv4) {
436 		iph = (ipha_t *)mp->b_rptr;
437 		iph->ipha_length = htons(sum);
438 	} else {
439 		ip6h = (ip6_t *)mp->b_rptr;
440 		/*
441 		 * If an ip6i_t is present, the real IPv6 header
442 		 * immediately follows.
443 		 */
444 		if (ip6h->ip6_nxt == IPPROTO_RAW)
445 			ip6h = (ip6_t *)&ip6h[1];
446 		ip6h->ip6_plen = htons(sum - ((char *)&sctp->sctp_ip6h[1] -
447 		    sctp->sctp_iphc6));
448 	}
449 }
450 
451 int
452 sctp_compare_faddrsets(sctp_faddr_t *a1, sctp_faddr_t *a2)
453 {
454 	int na1 = 0;
455 	int overlap = 0;
456 	int equal = 1;
457 	int onematch;
458 	sctp_faddr_t *fp1, *fp2;
459 
460 	for (fp1 = a1; fp1; fp1 = fp1->next) {
461 		onematch = 0;
462 		for (fp2 = a2; fp2; fp2 = fp2->next) {
463 			if (IN6_ARE_ADDR_EQUAL(&fp1->faddr, &fp2->faddr)) {
464 				overlap++;
465 				onematch = 1;
466 				break;
467 			}
468 			if (!onematch) {
469 				equal = 0;
470 			}
471 		}
472 		na1++;
473 	}
474 
475 	if (equal) {
476 		return (SCTP_ADDR_EQUAL);
477 	}
478 	if (overlap == na1) {
479 		return (SCTP_ADDR_SUBSET);
480 	}
481 	if (overlap) {
482 		return (SCTP_ADDR_OVERLAP);
483 	}
484 	return (SCTP_ADDR_DISJOINT);
485 }
486 
487 /*
488  * Returns 0 on success, ENOMEM on memory allocation failure, EHOSTUNREACH
489  * if the connection credentials fail remote host accreditation or
490  * if the new destination does not support the previously established
491  * connection security label. If sleep is true, this function should
492  * never fail for a memory allocation failure. The boolean parameter
493  * "first" decides whether the newly created faddr structure should be
494  * added at the beginning of the list or at the end.
495  *
496  * Note: caller must hold conn fanout lock.
497  */
498 int
499 sctp_add_faddr(sctp_t *sctp, in6_addr_t *addr, int sleep, boolean_t first)
500 {
501 	sctp_faddr_t	*faddr;
502 	mblk_t		*timer_mp;
503 	int		err;
504 
505 	if (is_system_labeled()) {
506 		cred_t *effective_cred;
507 
508 		/*
509 		 * Verify the destination is allowed to receive packets
510 		 * at the security label of the connection we are initiating.
511 		 *
512 		 * tsol_check_dest() will create a new effective cred for
513 		 * this connection with a modified label or label flags only
514 		 * if there are changes from the original cred.
515 		 *
516 		 * conn_effective_cred may be non-NULL if a previous
517 		 * faddr was already added or if this is a server
518 		 * accepting a connection on a multi-label port.
519 		 *
520 		 * Accept whatever label we get if this is the first
521 		 * destination address for this connection. The security
522 		 * label and label flags must match any previuous settings
523 		 * for all subsequent destination addresses.
524 		 */
525 		if (IN6_IS_ADDR_V4MAPPED(addr)) {
526 			uint32_t dst;
527 			IN6_V4MAPPED_TO_IPADDR(addr, dst);
528 			err = tsol_check_dest(CONN_CRED(sctp->sctp_connp),
529 			    &dst, IPV4_VERSION, sctp->sctp_mac_exempt,
530 			    &effective_cred);
531 		} else {
532 			err = tsol_check_dest(CONN_CRED(sctp->sctp_connp),
533 			    addr, IPV6_VERSION, sctp->sctp_mac_exempt,
534 			    &effective_cred);
535 		}
536 		if (err != 0)
537 			return (err);
538 		if (sctp->sctp_faddrs == NULL &&
539 		    sctp->sctp_connp->conn_effective_cred == NULL) {
540 			sctp->sctp_connp->conn_effective_cred = effective_cred;
541 		} else if (effective_cred != NULL) {
542 			crfree(effective_cred);
543 			return (EHOSTUNREACH);
544 		}
545 	}
546 
547 	if ((faddr = kmem_cache_alloc(sctp_kmem_faddr_cache, sleep)) == NULL)
548 		return (ENOMEM);
549 	timer_mp = sctp_timer_alloc((sctp), sctp_rexmit_timer, sleep);
550 	if (timer_mp == NULL) {
551 		kmem_cache_free(sctp_kmem_faddr_cache, faddr);
552 		return (ENOMEM);
553 	}
554 	((sctpt_t *)(timer_mp->b_rptr))->sctpt_faddr = faddr;
555 
556 	sctp_init_faddr(sctp, faddr, addr, timer_mp);
557 
558 	/* Check for subnet broadcast. */
559 	if (faddr->ire != NULL && faddr->ire->ire_type & IRE_BROADCAST) {
560 		IRE_REFRELE_NOTR(faddr->ire);
561 		sctp_timer_free(timer_mp);
562 		faddr->timer_mp = NULL;
563 		kmem_cache_free(sctp_kmem_faddr_cache, faddr);
564 		return (EADDRNOTAVAIL);
565 	}
566 	ASSERT(faddr->next == NULL);
567 
568 	if (sctp->sctp_faddrs == NULL) {
569 		ASSERT(sctp->sctp_lastfaddr == NULL);
570 		/* only element on list; first and last are same */
571 		sctp->sctp_faddrs = sctp->sctp_lastfaddr = faddr;
572 	} else if (first) {
573 		ASSERT(sctp->sctp_lastfaddr != NULL);
574 		faddr->next = sctp->sctp_faddrs;
575 		sctp->sctp_faddrs = faddr;
576 	} else {
577 		sctp->sctp_lastfaddr->next = faddr;
578 		sctp->sctp_lastfaddr = faddr;
579 	}
580 	sctp->sctp_nfaddrs++;
581 
582 	return (0);
583 }
584 
585 sctp_faddr_t *
586 sctp_lookup_faddr(sctp_t *sctp, in6_addr_t *addr)
587 {
588 	sctp_faddr_t *fp;
589 
590 	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
591 		if (IN6_ARE_ADDR_EQUAL(&fp->faddr, addr))
592 			break;
593 	}
594 
595 	return (fp);
596 }
597 
598 sctp_faddr_t *
599 sctp_lookup_faddr_nosctp(sctp_faddr_t *fp, in6_addr_t *addr)
600 {
601 	for (; fp; fp = fp->next) {
602 		if (IN6_ARE_ADDR_EQUAL(&fp->faddr, addr)) {
603 			break;
604 		}
605 	}
606 
607 	return (fp);
608 }
609 
610 /*
611  * To change the currently used peer address to the specified one.
612  */
613 void
614 sctp_set_faddr_current(sctp_t *sctp, sctp_faddr_t *fp)
615 {
616 	/* Now setup the composite header. */
617 	if (fp->isv4) {
618 		IN6_V4MAPPED_TO_IPADDR(&fp->faddr,
619 		    sctp->sctp_ipha->ipha_dst);
620 		IN6_V4MAPPED_TO_IPADDR(&fp->saddr, sctp->sctp_ipha->ipha_src);
621 		/* update don't fragment bit */
622 		if (fp->df) {
623 			sctp->sctp_ipha->ipha_fragment_offset_and_flags =
624 			    htons(IPH_DF);
625 		} else {
626 			sctp->sctp_ipha->ipha_fragment_offset_and_flags = 0;
627 		}
628 	} else {
629 		sctp->sctp_ip6h->ip6_dst = fp->faddr;
630 		sctp->sctp_ip6h->ip6_src = fp->saddr;
631 	}
632 
633 	sctp->sctp_current = fp;
634 	sctp->sctp_mss = fp->sfa_pmss;
635 
636 	/* Update the uppper layer for the change. */
637 	if (!SCTP_IS_DETACHED(sctp))
638 		sctp_set_ulp_prop(sctp);
639 }
640 
641 void
642 sctp_redo_faddr_srcs(sctp_t *sctp)
643 {
644 	sctp_faddr_t *fp;
645 
646 	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
647 		sctp_get_ire(sctp, fp);
648 	}
649 }
650 
651 void
652 sctp_faddr_alive(sctp_t *sctp, sctp_faddr_t *fp)
653 {
654 	int64_t now = lbolt64;
655 
656 	fp->strikes = 0;
657 	sctp->sctp_strikes = 0;
658 	fp->lastactive = now;
659 	fp->hb_expiry = now + SET_HB_INTVL(fp);
660 	fp->hb_pending = B_FALSE;
661 	if (fp->state != SCTP_FADDRS_ALIVE) {
662 		fp->state = SCTP_FADDRS_ALIVE;
663 		sctp_intf_event(sctp, fp->faddr, SCTP_ADDR_AVAILABLE, 0);
664 		/* Should have a full IRE now */
665 		sctp_get_ire(sctp, fp);
666 
667 		/*
668 		 * If this is the primary, switch back to it now.  And
669 		 * we probably want to reset the source addr used to reach
670 		 * it.
671 		 */
672 		if (fp == sctp->sctp_primary) {
673 			ASSERT(fp->state != SCTP_FADDRS_UNREACH);
674 			sctp_set_faddr_current(sctp, fp);
675 			return;
676 		}
677 	}
678 }
679 
680 int
681 sctp_is_a_faddr_clean(sctp_t *sctp)
682 {
683 	sctp_faddr_t *fp;
684 
685 	for (fp = sctp->sctp_faddrs; fp; fp = fp->next) {
686 		if (fp->state == SCTP_FADDRS_ALIVE && fp->strikes == 0) {
687 			return (1);
688 		}
689 	}
690 
691 	return (0);
692 }
693 
694 /*
695  * Returns 0 if there is at leave one other active faddr, -1 if there
696  * are none. If there are none left, faddr_dead() will start killing the
697  * association.
698  * If the downed faddr was the current faddr, a new current faddr
699  * will be chosen.
700  */
701 int
702 sctp_faddr_dead(sctp_t *sctp, sctp_faddr_t *fp, int newstate)
703 {
704 	sctp_faddr_t *ofp;
705 	sctp_stack_t *sctps = sctp->sctp_sctps;
706 
707 	if (fp->state == SCTP_FADDRS_ALIVE) {
708 		sctp_intf_event(sctp, fp->faddr, SCTP_ADDR_UNREACHABLE, 0);
709 	}
710 	fp->state = newstate;
711 
712 	dprint(1, ("sctp_faddr_dead: %x:%x:%x:%x down (state=%d)\n",
713 	    SCTP_PRINTADDR(fp->faddr), newstate));
714 
715 	if (fp == sctp->sctp_current) {
716 		/* Current faddr down; need to switch it */
717 		sctp->sctp_current = NULL;
718 	}
719 
720 	/* Find next alive faddr */
721 	ofp = fp;
722 	for (fp = fp->next; fp != NULL; fp = fp->next) {
723 		if (fp->state == SCTP_FADDRS_ALIVE) {
724 			break;
725 		}
726 	}
727 
728 	if (fp == NULL) {
729 		/* Continue from beginning of list */
730 		for (fp = sctp->sctp_faddrs; fp != ofp; fp = fp->next) {
731 			if (fp->state == SCTP_FADDRS_ALIVE) {
732 				break;
733 			}
734 		}
735 	}
736 
737 	/*
738 	 * Find a new fp, so if the current faddr is dead, use the new fp
739 	 * as the current one.
740 	 */
741 	if (fp != ofp) {
742 		if (sctp->sctp_current == NULL) {
743 			dprint(1, ("sctp_faddr_dead: failover->%x:%x:%x:%x\n",
744 			    SCTP_PRINTADDR(fp->faddr)));
745 			/*
746 			 * Note that we don't need to reset the source addr
747 			 * of the new fp.
748 			 */
749 			sctp_set_faddr_current(sctp, fp);
750 		}
751 		return (0);
752 	}
753 
754 
755 	/* All faddrs are down; kill the association */
756 	dprint(1, ("sctp_faddr_dead: all faddrs down, killing assoc\n"));
757 	BUMP_MIB(&sctps->sctps_mib, sctpAborted);
758 	sctp_assoc_event(sctp, sctp->sctp_state < SCTPS_ESTABLISHED ?
759 	    SCTP_CANT_STR_ASSOC : SCTP_COMM_LOST, 0, NULL);
760 	sctp_clean_death(sctp, sctp->sctp_client_errno ?
761 	    sctp->sctp_client_errno : ETIMEDOUT);
762 
763 	return (-1);
764 }
765 
766 sctp_faddr_t *
767 sctp_rotate_faddr(sctp_t *sctp, sctp_faddr_t *ofp)
768 {
769 	sctp_faddr_t *nfp = NULL;
770 
771 	if (ofp == NULL) {
772 		ofp = sctp->sctp_current;
773 	}
774 
775 	/* Find the next live one */
776 	for (nfp = ofp->next; nfp != NULL; nfp = nfp->next) {
777 		if (nfp->state == SCTP_FADDRS_ALIVE) {
778 			break;
779 		}
780 	}
781 
782 	if (nfp == NULL) {
783 		/* Continue from beginning of list */
784 		for (nfp = sctp->sctp_faddrs; nfp != ofp; nfp = nfp->next) {
785 			if (nfp->state == SCTP_FADDRS_ALIVE) {
786 				break;
787 			}
788 		}
789 	}
790 
791 	/*
792 	 * nfp could only be NULL if all faddrs are down, and when
793 	 * this happens, faddr_dead() should have killed the
794 	 * association. Hence this assertion...
795 	 */
796 	ASSERT(nfp != NULL);
797 	return (nfp);
798 }
799 
800 void
801 sctp_unlink_faddr(sctp_t *sctp, sctp_faddr_t *fp)
802 {
803 	sctp_faddr_t *fpp;
804 
805 	if (!sctp->sctp_faddrs) {
806 		return;
807 	}
808 
809 	if (fp->timer_mp != NULL) {
810 		sctp_timer_free(fp->timer_mp);
811 		fp->timer_mp = NULL;
812 		fp->timer_running = 0;
813 	}
814 	if (fp->rc_timer_mp != NULL) {
815 		sctp_timer_free(fp->rc_timer_mp);
816 		fp->rc_timer_mp = NULL;
817 		fp->rc_timer_running = 0;
818 	}
819 	if (fp->ire != NULL) {
820 		IRE_REFRELE_NOTR(fp->ire);
821 		fp->ire = NULL;
822 	}
823 
824 	if (fp == sctp->sctp_faddrs) {
825 		goto gotit;
826 	}
827 
828 	for (fpp = sctp->sctp_faddrs; fpp->next != fp; fpp = fpp->next)
829 		;
830 
831 gotit:
832 	ASSERT(sctp->sctp_conn_tfp != NULL);
833 	mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
834 	if (fp == sctp->sctp_faddrs) {
835 		sctp->sctp_faddrs = fp->next;
836 	} else {
837 		fpp->next = fp->next;
838 	}
839 	mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
840 	/* XXX faddr2ire? */
841 	kmem_cache_free(sctp_kmem_faddr_cache, fp);
842 	sctp->sctp_nfaddrs--;
843 }
844 
845 void
846 sctp_zap_faddrs(sctp_t *sctp, int caller_holds_lock)
847 {
848 	sctp_faddr_t *fp, *fpn;
849 
850 	if (sctp->sctp_faddrs == NULL) {
851 		ASSERT(sctp->sctp_lastfaddr == NULL);
852 		return;
853 	}
854 
855 	ASSERT(sctp->sctp_lastfaddr != NULL);
856 	sctp->sctp_lastfaddr = NULL;
857 	sctp->sctp_current = NULL;
858 	sctp->sctp_primary = NULL;
859 
860 	sctp_free_faddr_timers(sctp);
861 
862 	if (sctp->sctp_conn_tfp != NULL && !caller_holds_lock) {
863 		/* in conn fanout; need to hold lock */
864 		mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
865 	}
866 
867 	for (fp = sctp->sctp_faddrs; fp; fp = fpn) {
868 		fpn = fp->next;
869 		if (fp->ire != NULL)
870 			IRE_REFRELE_NOTR(fp->ire);
871 		kmem_cache_free(sctp_kmem_faddr_cache, fp);
872 		sctp->sctp_nfaddrs--;
873 	}
874 
875 	sctp->sctp_faddrs = NULL;
876 	ASSERT(sctp->sctp_nfaddrs == 0);
877 	if (sctp->sctp_conn_tfp != NULL && !caller_holds_lock) {
878 		mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
879 	}
880 
881 }
882 
883 void
884 sctp_zap_addrs(sctp_t *sctp)
885 {
886 	sctp_zap_faddrs(sctp, 0);
887 	sctp_free_saddrs(sctp);
888 }
889 
890 /*
891  * Initialize the IPv4 header. Loses any record of any IP options.
892  */
893 int
894 sctp_header_init_ipv4(sctp_t *sctp, int sleep)
895 {
896 	sctp_hdr_t	*sctph;
897 	sctp_stack_t	*sctps = sctp->sctp_sctps;
898 
899 	/*
900 	 * This is a simple initialization. If there's
901 	 * already a template, it should never be too small,
902 	 * so reuse it.  Otherwise, allocate space for the new one.
903 	 */
904 	if (sctp->sctp_iphc != NULL) {
905 		ASSERT(sctp->sctp_iphc_len >= SCTP_MAX_COMBINED_HEADER_LENGTH);
906 		bzero(sctp->sctp_iphc, sctp->sctp_iphc_len);
907 	} else {
908 		sctp->sctp_iphc_len = SCTP_MAX_COMBINED_HEADER_LENGTH;
909 		sctp->sctp_iphc = kmem_zalloc(sctp->sctp_iphc_len, sleep);
910 		if (sctp->sctp_iphc == NULL) {
911 			sctp->sctp_iphc_len = 0;
912 			return (ENOMEM);
913 		}
914 	}
915 
916 	sctp->sctp_ipha = (ipha_t *)sctp->sctp_iphc;
917 
918 	sctp->sctp_hdr_len = sizeof (ipha_t) + sizeof (sctp_hdr_t);
919 	sctp->sctp_ip_hdr_len = sizeof (ipha_t);
920 	sctp->sctp_ipha->ipha_length = htons(sizeof (ipha_t) +
921 	    sizeof (sctp_hdr_t));
922 	sctp->sctp_ipha->ipha_version_and_hdr_length =
923 	    (IP_VERSION << 4) | IP_SIMPLE_HDR_LENGTH_IN_WORDS;
924 
925 	/*
926 	 * These two fields should be zero, and are already set above.
927 	 *
928 	 * sctp->sctp_ipha->ipha_ident,
929 	 * sctp->sctp_ipha->ipha_fragment_offset_and_flags.
930 	 */
931 
932 	sctp->sctp_ipha->ipha_ttl = sctps->sctps_ipv4_ttl;
933 	sctp->sctp_ipha->ipha_protocol = IPPROTO_SCTP;
934 
935 	sctph = (sctp_hdr_t *)(sctp->sctp_iphc + sizeof (ipha_t));
936 	sctp->sctp_sctph = sctph;
937 
938 	return (0);
939 }
940 
941 /*
942  * Update sctp_sticky_hdrs based on sctp_sticky_ipp.
943  * The headers include ip6i_t (if needed), ip6_t, any sticky extension
944  * headers, and the maximum size sctp header (to avoid reallocation
945  * on the fly for additional sctp options).
946  * Returns failure if can't allocate memory.
947  */
948 int
949 sctp_build_hdrs(sctp_t *sctp)
950 {
951 	char		*hdrs;
952 	uint_t		hdrs_len;
953 	ip6i_t		*ip6i;
954 	char		buf[SCTP_MAX_HDR_LENGTH];
955 	ip6_pkt_t	*ipp = &sctp->sctp_sticky_ipp;
956 	in6_addr_t	src;
957 	in6_addr_t	dst;
958 	sctp_stack_t	*sctps = sctp->sctp_sctps;
959 
960 	/*
961 	 * save the existing sctp header and source/dest IP addresses
962 	 */
963 	bcopy(sctp->sctp_sctph6, buf, sizeof (sctp_hdr_t));
964 	src = sctp->sctp_ip6h->ip6_src;
965 	dst = sctp->sctp_ip6h->ip6_dst;
966 	hdrs_len = ip_total_hdrs_len_v6(ipp) + SCTP_MAX_HDR_LENGTH;
967 	ASSERT(hdrs_len != 0);
968 	if (hdrs_len > sctp->sctp_iphc6_len) {
969 		/* Need to reallocate */
970 		hdrs = kmem_zalloc(hdrs_len, KM_NOSLEEP);
971 		if (hdrs == NULL)
972 			return (ENOMEM);
973 
974 		if (sctp->sctp_iphc6_len != 0)
975 			kmem_free(sctp->sctp_iphc6, sctp->sctp_iphc6_len);
976 		sctp->sctp_iphc6 = hdrs;
977 		sctp->sctp_iphc6_len = hdrs_len;
978 	}
979 	ip_build_hdrs_v6((uchar_t *)sctp->sctp_iphc6,
980 	    hdrs_len - SCTP_MAX_HDR_LENGTH, ipp, IPPROTO_SCTP);
981 
982 	/* Set header fields not in ipp */
983 	if (ipp->ipp_fields & IPPF_HAS_IP6I) {
984 		ip6i = (ip6i_t *)sctp->sctp_iphc6;
985 		sctp->sctp_ip6h = (ip6_t *)&ip6i[1];
986 	} else {
987 		sctp->sctp_ip6h = (ip6_t *)sctp->sctp_iphc6;
988 	}
989 	/*
990 	 * sctp->sctp_ip_hdr_len will include ip6i_t if there is one.
991 	 */
992 	sctp->sctp_ip_hdr6_len = hdrs_len - SCTP_MAX_HDR_LENGTH;
993 	sctp->sctp_sctph6 = (sctp_hdr_t *)(sctp->sctp_iphc6 +
994 	    sctp->sctp_ip_hdr6_len);
995 	sctp->sctp_hdr6_len = sctp->sctp_ip_hdr6_len + sizeof (sctp_hdr_t);
996 
997 	bcopy(buf, sctp->sctp_sctph6, sizeof (sctp_hdr_t));
998 
999 	sctp->sctp_ip6h->ip6_src = src;
1000 	sctp->sctp_ip6h->ip6_dst = dst;
1001 	/*
1002 	 * If the hoplimit was not set by ip_build_hdrs_v6(), we need to
1003 	 * set it to the default value for SCTP.
1004 	 */
1005 	if (!(ipp->ipp_fields & IPPF_UNICAST_HOPS))
1006 		sctp->sctp_ip6h->ip6_hops = sctps->sctps_ipv6_hoplimit;
1007 	/*
1008 	 * If we're setting extension headers after a connection
1009 	 * has been established, and if we have a routing header
1010 	 * among the extension headers, call ip_massage_options_v6 to
1011 	 * manipulate the routing header/ip6_dst set the checksum
1012 	 * difference in the sctp header template.
1013 	 * (This happens in sctp_connect_ipv6 if the routing header
1014 	 * is set prior to the connect.)
1015 	 */
1016 
1017 	if ((sctp->sctp_state >= SCTPS_COOKIE_WAIT) &&
1018 	    (sctp->sctp_sticky_ipp.ipp_fields & IPPF_RTHDR)) {
1019 		ip6_rthdr_t *rth;
1020 
1021 		rth = ip_find_rthdr_v6(sctp->sctp_ip6h,
1022 		    (uint8_t *)sctp->sctp_sctph6);
1023 		if (rth != NULL) {
1024 			(void) ip_massage_options_v6(sctp->sctp_ip6h, rth,
1025 			    sctps->sctps_netstack);
1026 		}
1027 	}
1028 	return (0);
1029 }
1030 
1031 /*
1032  * Initialize the IPv6 header. Loses any record of any IPv6 extension headers.
1033  */
1034 int
1035 sctp_header_init_ipv6(sctp_t *sctp, int sleep)
1036 {
1037 	sctp_hdr_t	*sctph;
1038 	sctp_stack_t	*sctps = sctp->sctp_sctps;
1039 
1040 	/*
1041 	 * This is a simple initialization. If there's
1042 	 * already a template, it should never be too small,
1043 	 * so reuse it. Otherwise, allocate space for the new one.
1044 	 * Ensure that there is enough space to "downgrade" the sctp_t
1045 	 * to an IPv4 sctp_t. This requires having space for a full load
1046 	 * of IPv4 options
1047 	 */
1048 	if (sctp->sctp_iphc6 != NULL) {
1049 		ASSERT(sctp->sctp_iphc6_len >=
1050 		    SCTP_MAX_COMBINED_HEADER_LENGTH);
1051 		bzero(sctp->sctp_iphc6, sctp->sctp_iphc6_len);
1052 	} else {
1053 		sctp->sctp_iphc6_len = SCTP_MAX_COMBINED_HEADER_LENGTH;
1054 		sctp->sctp_iphc6 = kmem_zalloc(sctp->sctp_iphc_len, sleep);
1055 		if (sctp->sctp_iphc6 == NULL) {
1056 			sctp->sctp_iphc6_len = 0;
1057 			return (ENOMEM);
1058 		}
1059 	}
1060 	sctp->sctp_hdr6_len = IPV6_HDR_LEN + sizeof (sctp_hdr_t);
1061 	sctp->sctp_ip_hdr6_len = IPV6_HDR_LEN;
1062 	sctp->sctp_ip6h = (ip6_t *)sctp->sctp_iphc6;
1063 
1064 	/* Initialize the header template */
1065 
1066 	sctp->sctp_ip6h->ip6_vcf = IPV6_DEFAULT_VERS_AND_FLOW;
1067 	sctp->sctp_ip6h->ip6_plen = ntohs(sizeof (sctp_hdr_t));
1068 	sctp->sctp_ip6h->ip6_nxt = IPPROTO_SCTP;
1069 	sctp->sctp_ip6h->ip6_hops = sctps->sctps_ipv6_hoplimit;
1070 
1071 	sctph = (sctp_hdr_t *)(sctp->sctp_iphc6 + IPV6_HDR_LEN);
1072 	sctp->sctp_sctph6 = sctph;
1073 
1074 	return (0);
1075 }
1076 
1077 static int
1078 sctp_v4_label(sctp_t *sctp)
1079 {
1080 	uchar_t optbuf[IP_MAX_OPT_LENGTH];
1081 	const cred_t *cr = CONN_CRED(sctp->sctp_connp);
1082 	int added;
1083 
1084 	if (tsol_compute_label(cr, sctp->sctp_ipha->ipha_dst, optbuf,
1085 	    sctp->sctp_sctps->sctps_netstack->netstack_ip) != 0)
1086 		return (EACCES);
1087 
1088 	added = tsol_remove_secopt(sctp->sctp_ipha, sctp->sctp_hdr_len);
1089 	if (added == -1)
1090 		return (EACCES);
1091 	sctp->sctp_hdr_len += added;
1092 	sctp->sctp_sctph = (sctp_hdr_t *)((uchar_t *)sctp->sctp_sctph + added);
1093 	sctp->sctp_ip_hdr_len += added;
1094 	if ((sctp->sctp_v4label_len = optbuf[IPOPT_OLEN]) != 0) {
1095 		sctp->sctp_v4label_len = (sctp->sctp_v4label_len + 3) & ~3;
1096 		added = tsol_prepend_option(optbuf, sctp->sctp_ipha,
1097 		    sctp->sctp_hdr_len);
1098 		if (added == -1)
1099 			return (EACCES);
1100 		sctp->sctp_hdr_len += added;
1101 		sctp->sctp_sctph = (sctp_hdr_t *)((uchar_t *)sctp->sctp_sctph +
1102 		    added);
1103 		sctp->sctp_ip_hdr_len += added;
1104 	}
1105 	return (0);
1106 }
1107 
1108 static int
1109 sctp_v6_label(sctp_t *sctp)
1110 {
1111 	uchar_t optbuf[TSOL_MAX_IPV6_OPTION];
1112 	const cred_t *cr = CONN_CRED(sctp->sctp_connp);
1113 
1114 	if (tsol_compute_label_v6(cr, &sctp->sctp_ip6h->ip6_dst, optbuf,
1115 	    sctp->sctp_sctps->sctps_netstack->netstack_ip) != 0)
1116 		return (EACCES);
1117 	if (tsol_update_sticky(&sctp->sctp_sticky_ipp, &sctp->sctp_v6label_len,
1118 	    optbuf) != 0)
1119 		return (EACCES);
1120 	if (sctp_build_hdrs(sctp) != 0)
1121 		return (EACCES);
1122 	return (0);
1123 }
1124 
1125 /*
1126  * XXX implement more sophisticated logic
1127  */
1128 int
1129 sctp_set_hdraddrs(sctp_t *sctp)
1130 {
1131 	sctp_faddr_t *fp;
1132 	int gotv4 = 0;
1133 	int gotv6 = 0;
1134 
1135 	ASSERT(sctp->sctp_faddrs != NULL);
1136 	ASSERT(sctp->sctp_nsaddrs > 0);
1137 
1138 	/* Set up using the primary first */
1139 	if (IN6_IS_ADDR_V4MAPPED(&sctp->sctp_primary->faddr)) {
1140 		IN6_V4MAPPED_TO_IPADDR(&sctp->sctp_primary->faddr,
1141 		    sctp->sctp_ipha->ipha_dst);
1142 		/* saddr may be unspec; make_mp() will handle this */
1143 		IN6_V4MAPPED_TO_IPADDR(&sctp->sctp_primary->saddr,
1144 		    sctp->sctp_ipha->ipha_src);
1145 		if (!is_system_labeled() || sctp_v4_label(sctp) == 0) {
1146 			gotv4 = 1;
1147 			if (sctp->sctp_ipversion == IPV4_VERSION) {
1148 				goto copyports;
1149 			}
1150 		}
1151 	} else {
1152 		sctp->sctp_ip6h->ip6_dst = sctp->sctp_primary->faddr;
1153 		/* saddr may be unspec; make_mp() will handle this */
1154 		sctp->sctp_ip6h->ip6_src = sctp->sctp_primary->saddr;
1155 		if (!is_system_labeled() || sctp_v6_label(sctp) == 0)
1156 			gotv6 = 1;
1157 	}
1158 
1159 	for (fp = sctp->sctp_faddrs; fp; fp = fp->next) {
1160 		if (!gotv4 && IN6_IS_ADDR_V4MAPPED(&fp->faddr)) {
1161 			IN6_V4MAPPED_TO_IPADDR(&fp->faddr,
1162 			    sctp->sctp_ipha->ipha_dst);
1163 			/* copy in the faddr_t's saddr */
1164 			IN6_V4MAPPED_TO_IPADDR(&fp->saddr,
1165 			    sctp->sctp_ipha->ipha_src);
1166 			if (!is_system_labeled() || sctp_v4_label(sctp) == 0) {
1167 				gotv4 = 1;
1168 				if (sctp->sctp_ipversion == IPV4_VERSION ||
1169 				    gotv6) {
1170 					break;
1171 				}
1172 			}
1173 		} else if (!gotv6 && !IN6_IS_ADDR_V4MAPPED(&fp->faddr)) {
1174 			sctp->sctp_ip6h->ip6_dst = fp->faddr;
1175 			/* copy in the faddr_t's saddr */
1176 			sctp->sctp_ip6h->ip6_src = fp->saddr;
1177 			if (!is_system_labeled() || sctp_v6_label(sctp) == 0) {
1178 				gotv6 = 1;
1179 				if (gotv4)
1180 					break;
1181 			}
1182 		}
1183 	}
1184 
1185 copyports:
1186 	if (!gotv4 && !gotv6)
1187 		return (EACCES);
1188 
1189 	/* copy in the ports for good measure */
1190 	sctp->sctp_sctph->sh_sport = sctp->sctp_lport;
1191 	sctp->sctp_sctph->sh_dport = sctp->sctp_fport;
1192 
1193 	sctp->sctp_sctph6->sh_sport = sctp->sctp_lport;
1194 	sctp->sctp_sctph6->sh_dport = sctp->sctp_fport;
1195 	return (0);
1196 }
1197 
1198 /*
1199  * got_errchunk is set B_TRUE only if called from validate_init_params(), when
1200  * an ERROR chunk is already prepended the size of which needs updating for
1201  * additional unrecognized parameters. Other callers either prepend the ERROR
1202  * chunk with the correct size after calling this function, or they are calling
1203  * to add an invalid parameter to an INIT_ACK chunk, in that case no ERROR chunk
1204  * exists, the CAUSE blocks go into the INIT_ACK directly.
1205  *
1206  * *errmp will be non-NULL both when adding an additional CAUSE block to an
1207  * existing prepended COOKIE ERROR chunk (processing params of an INIT_ACK),
1208  * and when adding unrecognized parameters after the first, to an INIT_ACK
1209  * (processing params of an INIT chunk).
1210  */
1211 void
1212 sctp_add_unrec_parm(sctp_parm_hdr_t *uph, mblk_t **errmp,
1213     boolean_t got_errchunk)
1214 {
1215 	mblk_t *mp;
1216 	sctp_parm_hdr_t *ph;
1217 	size_t len;
1218 	int pad;
1219 	sctp_chunk_hdr_t *ecp;
1220 
1221 	len = sizeof (*ph) + ntohs(uph->sph_len);
1222 	if ((pad = len % SCTP_ALIGN) != 0) {
1223 		pad = SCTP_ALIGN - pad;
1224 		len += pad;
1225 	}
1226 	mp = allocb(len, BPRI_MED);
1227 	if (mp == NULL) {
1228 		return;
1229 	}
1230 
1231 	ph = (sctp_parm_hdr_t *)(mp->b_rptr);
1232 	ph->sph_type = htons(PARM_UNRECOGNIZED);
1233 	ph->sph_len = htons(len - pad);
1234 
1235 	/* copy in the unrecognized parameter */
1236 	bcopy(uph, ph + 1, ntohs(uph->sph_len));
1237 
1238 	if (pad != 0)
1239 		bzero((mp->b_rptr + len - pad), pad);
1240 
1241 	mp->b_wptr = mp->b_rptr + len;
1242 	if (*errmp != NULL) {
1243 		/*
1244 		 * Update total length if an ERROR chunk, then link
1245 		 * this CAUSE block to the possible chain of CAUSE
1246 		 * blocks attached to the ERROR chunk or INIT_ACK
1247 		 * being created.
1248 		 */
1249 		if (got_errchunk) {
1250 			/* ERROR chunk already prepended */
1251 			ecp = (sctp_chunk_hdr_t *)((*errmp)->b_rptr);
1252 			ecp->sch_len = htons(ntohs(ecp->sch_len) + len);
1253 		}
1254 		linkb(*errmp, mp);
1255 	} else {
1256 		*errmp = mp;
1257 	}
1258 }
1259 
1260 /*
1261  * o Bounds checking
1262  * o Updates remaining
1263  * o Checks alignment
1264  */
1265 sctp_parm_hdr_t *
1266 sctp_next_parm(sctp_parm_hdr_t *current, ssize_t *remaining)
1267 {
1268 	int pad;
1269 	uint16_t len;
1270 
1271 	len = ntohs(current->sph_len);
1272 	*remaining -= len;
1273 	if (*remaining < sizeof (*current) || len < sizeof (*current)) {
1274 		return (NULL);
1275 	}
1276 	if ((pad = len & (SCTP_ALIGN - 1)) != 0) {
1277 		pad = SCTP_ALIGN - pad;
1278 		*remaining -= pad;
1279 	}
1280 	/*LINTED pointer cast may result in improper alignment*/
1281 	current = (sctp_parm_hdr_t *)((char *)current + len + pad);
1282 	return (current);
1283 }
1284 
1285 /*
1286  * Sets the address parameters given in the INIT chunk into sctp's
1287  * faddrs; if psctp is non-NULL, copies psctp's saddrs. If there are
1288  * no address parameters in the INIT chunk, a single faddr is created
1289  * from the ip hdr at the beginning of pkt.
1290  * If there already are existing addresses hanging from sctp, merge
1291  * them in, if the old info contains addresses which are not present
1292  * in this new info, get rid of them, and clean the pointers if there's
1293  * messages which have this as their target address.
1294  *
1295  * We also re-adjust the source address list here since the list may
1296  * contain more than what is actually part of the association. If
1297  * we get here from sctp_send_cookie_echo(), we are on the active
1298  * side and psctp will be NULL and ich will be the INIT-ACK chunk.
1299  * If we get here from sctp_accept_comm(), ich will be the INIT chunk
1300  * and psctp will the listening endpoint.
1301  *
1302  * INIT processing: When processing the INIT we inherit the src address
1303  * list from the listener. For a loopback or linklocal association, we
1304  * delete the list and just take the address from the IP header (since
1305  * that's how we created the INIT-ACK). Additionally, for loopback we
1306  * ignore the address params in the INIT. For determining which address
1307  * types were sent in the INIT-ACK we follow the same logic as in
1308  * creating the INIT-ACK. We delete addresses of the type that are not
1309  * supported by the peer.
1310  *
1311  * INIT-ACK processing: When processing the INIT-ACK since we had not
1312  * included addr params for loopback or linklocal addresses when creating
1313  * the INIT, we just use the address from the IP header. Further, for
1314  * loopback we ignore the addr param list. We mark addresses of the
1315  * type not supported by the peer as unconfirmed.
1316  *
1317  * In case of INIT processing we look for supported address types in the
1318  * supported address param, if present. In both cases the address type in
1319  * the IP header is supported as well as types for addresses in the param
1320  * list, if any.
1321  *
1322  * Once we have the supported address types sctp_check_saddr() runs through
1323  * the source address list and deletes or marks as unconfirmed address of
1324  * types not supported by the peer.
1325  *
1326  * Returns 0 on success, sys errno on failure
1327  */
1328 int
1329 sctp_get_addrparams(sctp_t *sctp, sctp_t *psctp, mblk_t *pkt,
1330     sctp_chunk_hdr_t *ich, uint_t *sctp_options)
1331 {
1332 	sctp_init_chunk_t	*init;
1333 	ipha_t			*iph;
1334 	ip6_t			*ip6h;
1335 	in6_addr_t		hdrsaddr[1];
1336 	in6_addr_t		hdrdaddr[1];
1337 	sctp_parm_hdr_t		*ph;
1338 	ssize_t			remaining;
1339 	int			isv4;
1340 	int			err;
1341 	sctp_faddr_t		*fp;
1342 	int			supp_af = 0;
1343 	boolean_t		check_saddr = B_TRUE;
1344 	in6_addr_t		curaddr;
1345 	sctp_stack_t		*sctps = sctp->sctp_sctps;
1346 
1347 	if (sctp_options != NULL)
1348 		*sctp_options = 0;
1349 
1350 	/* extract the address from the IP header */
1351 	isv4 = (IPH_HDR_VERSION(pkt->b_rptr) == IPV4_VERSION);
1352 	if (isv4) {
1353 		iph = (ipha_t *)pkt->b_rptr;
1354 		IN6_IPADDR_TO_V4MAPPED(iph->ipha_src, hdrsaddr);
1355 		IN6_IPADDR_TO_V4MAPPED(iph->ipha_dst, hdrdaddr);
1356 		supp_af |= PARM_SUPP_V4;
1357 	} else {
1358 		ip6h = (ip6_t *)pkt->b_rptr;
1359 		hdrsaddr[0] = ip6h->ip6_src;
1360 		hdrdaddr[0] = ip6h->ip6_dst;
1361 		supp_af |= PARM_SUPP_V6;
1362 	}
1363 
1364 	/*
1365 	 * Unfortunately, we can't delay this because adding an faddr
1366 	 * looks for the presence of the source address (from the ire
1367 	 * for the faddr) in the source address list. We could have
1368 	 * delayed this if, say, this was a loopback/linklocal connection.
1369 	 * Now, we just end up nuking this list and taking the addr from
1370 	 * the IP header for loopback/linklocal.
1371 	 */
1372 	if (psctp != NULL && psctp->sctp_nsaddrs > 0) {
1373 		ASSERT(sctp->sctp_nsaddrs == 0);
1374 
1375 		err = sctp_dup_saddrs(psctp, sctp, KM_NOSLEEP);
1376 		if (err != 0)
1377 			return (err);
1378 	}
1379 	/*
1380 	 * We will add the faddr before parsing the address list as this
1381 	 * might be a loopback connection and we would not have to
1382 	 * go through the list.
1383 	 *
1384 	 * Make sure the header's addr is in the list
1385 	 */
1386 	fp = sctp_lookup_faddr(sctp, hdrsaddr);
1387 	if (fp == NULL) {
1388 		/* not included; add it now */
1389 		err = sctp_add_faddr(sctp, hdrsaddr, KM_NOSLEEP, B_TRUE);
1390 		if (err != 0)
1391 			return (err);
1392 
1393 		/* sctp_faddrs will be the hdr addr */
1394 		fp = sctp->sctp_faddrs;
1395 	}
1396 	/* make the header addr the primary */
1397 
1398 	if (cl_sctp_assoc_change != NULL && psctp == NULL)
1399 		curaddr = sctp->sctp_current->faddr;
1400 
1401 	sctp->sctp_primary = fp;
1402 	sctp->sctp_current = fp;
1403 	sctp->sctp_mss = fp->sfa_pmss;
1404 
1405 	/* For loopback connections & linklocal get address from the header */
1406 	if (sctp->sctp_loopback || sctp->sctp_linklocal) {
1407 		if (sctp->sctp_nsaddrs != 0)
1408 			sctp_free_saddrs(sctp);
1409 		if ((err = sctp_saddr_add_addr(sctp, hdrdaddr, 0)) != 0)
1410 			return (err);
1411 		/* For loopback ignore address list */
1412 		if (sctp->sctp_loopback)
1413 			return (0);
1414 		check_saddr = B_FALSE;
1415 	}
1416 
1417 	/* Walk the params in the INIT [ACK], pulling out addr params */
1418 	remaining = ntohs(ich->sch_len) - sizeof (*ich) -
1419 	    sizeof (sctp_init_chunk_t);
1420 	if (remaining < sizeof (*ph)) {
1421 		if (check_saddr) {
1422 			sctp_check_saddr(sctp, supp_af, psctp == NULL ?
1423 			    B_FALSE : B_TRUE, hdrdaddr);
1424 		}
1425 		ASSERT(sctp_saddr_lookup(sctp, hdrdaddr, 0) != NULL);
1426 		return (0);
1427 	}
1428 
1429 	init = (sctp_init_chunk_t *)(ich + 1);
1430 	ph = (sctp_parm_hdr_t *)(init + 1);
1431 
1432 	/* params will have already been byteordered when validating */
1433 	while (ph != NULL) {
1434 		if (ph->sph_type == htons(PARM_SUPP_ADDRS)) {
1435 			int		plen;
1436 			uint16_t	*p;
1437 			uint16_t	addrtype;
1438 
1439 			ASSERT(psctp != NULL);
1440 			plen = ntohs(ph->sph_len);
1441 			p = (uint16_t *)(ph + 1);
1442 			while (plen > 0) {
1443 				addrtype = ntohs(*p);
1444 				switch (addrtype) {
1445 					case PARM_ADDR6:
1446 						supp_af |= PARM_SUPP_V6;
1447 						break;
1448 					case PARM_ADDR4:
1449 						supp_af |= PARM_SUPP_V4;
1450 						break;
1451 					default:
1452 						break;
1453 				}
1454 				p++;
1455 				plen -= sizeof (*p);
1456 			}
1457 		} else if (ph->sph_type == htons(PARM_ADDR4)) {
1458 			if (remaining >= PARM_ADDR4_LEN) {
1459 				in6_addr_t addr;
1460 				ipaddr_t ta;
1461 
1462 				supp_af |= PARM_SUPP_V4;
1463 				/*
1464 				 * Screen out broad/multicasts & loopback.
1465 				 * If the endpoint only accepts v6 address,
1466 				 * go to the next one.
1467 				 *
1468 				 * Subnet broadcast check is done in
1469 				 * sctp_add_faddr().  If the address is
1470 				 * a broadcast address, it won't be added.
1471 				 */
1472 				bcopy(ph + 1, &ta, sizeof (ta));
1473 				if (ta == 0 ||
1474 				    ta == INADDR_BROADCAST ||
1475 				    ta == htonl(INADDR_LOOPBACK) ||
1476 				    CLASSD(ta) ||
1477 				    sctp->sctp_connp->conn_ipv6_v6only) {
1478 					goto next;
1479 				}
1480 				IN6_INADDR_TO_V4MAPPED((struct in_addr *)
1481 				    (ph + 1), &addr);
1482 
1483 				/* Check for duplicate. */
1484 				if (sctp_lookup_faddr(sctp, &addr) != NULL)
1485 					goto next;
1486 
1487 				/* OK, add it to the faddr set */
1488 				err = sctp_add_faddr(sctp, &addr, KM_NOSLEEP,
1489 				    B_FALSE);
1490 				/* Something is wrong...  Try the next one. */
1491 				if (err != 0)
1492 					goto next;
1493 			}
1494 		} else if (ph->sph_type == htons(PARM_ADDR6) &&
1495 		    sctp->sctp_family == AF_INET6) {
1496 			/* An v4 socket should not take v6 addresses. */
1497 			if (remaining >= PARM_ADDR6_LEN) {
1498 				in6_addr_t *addr6;
1499 
1500 				supp_af |= PARM_SUPP_V6;
1501 				addr6 = (in6_addr_t *)(ph + 1);
1502 				/*
1503 				 * Screen out link locals, mcast, loopback
1504 				 * and bogus v6 address.
1505 				 */
1506 				if (IN6_IS_ADDR_LINKLOCAL(addr6) ||
1507 				    IN6_IS_ADDR_MULTICAST(addr6) ||
1508 				    IN6_IS_ADDR_LOOPBACK(addr6) ||
1509 				    IN6_IS_ADDR_V4MAPPED(addr6)) {
1510 					goto next;
1511 				}
1512 				/* Check for duplicate. */
1513 				if (sctp_lookup_faddr(sctp, addr6) != NULL)
1514 					goto next;
1515 
1516 				err = sctp_add_faddr(sctp,
1517 				    (in6_addr_t *)(ph + 1), KM_NOSLEEP,
1518 				    B_FALSE);
1519 				/* Something is wrong...  Try the next one. */
1520 				if (err != 0)
1521 					goto next;
1522 			}
1523 		} else if (ph->sph_type == htons(PARM_FORWARD_TSN)) {
1524 			if (sctp_options != NULL)
1525 				*sctp_options |= SCTP_PRSCTP_OPTION;
1526 		} /* else; skip */
1527 
1528 next:
1529 		ph = sctp_next_parm(ph, &remaining);
1530 	}
1531 	if (check_saddr) {
1532 		sctp_check_saddr(sctp, supp_af, psctp == NULL ? B_FALSE :
1533 		    B_TRUE, hdrdaddr);
1534 	}
1535 	ASSERT(sctp_saddr_lookup(sctp, hdrdaddr, 0) != NULL);
1536 	/*
1537 	 * We have the right address list now, update clustering's
1538 	 * knowledge because when we sent the INIT we had just added
1539 	 * the address the INIT was sent to.
1540 	 */
1541 	if (psctp == NULL && cl_sctp_assoc_change != NULL) {
1542 		uchar_t	*alist;
1543 		size_t	asize;
1544 		uchar_t	*dlist;
1545 		size_t	dsize;
1546 
1547 		asize = sizeof (in6_addr_t) * sctp->sctp_nfaddrs;
1548 		alist = kmem_alloc(asize, KM_NOSLEEP);
1549 		if (alist == NULL) {
1550 			SCTP_KSTAT(sctps, sctp_cl_assoc_change);
1551 			return (ENOMEM);
1552 		}
1553 		/*
1554 		 * Just include the address the INIT was sent to in the
1555 		 * delete list and send the entire faddr list. We could
1556 		 * do it differently (i.e include all the addresses in the
1557 		 * add list even if it contains the original address OR
1558 		 * remove the original address from the add list etc.), but
1559 		 * this seems reasonable enough.
1560 		 */
1561 		dsize = sizeof (in6_addr_t);
1562 		dlist = kmem_alloc(dsize, KM_NOSLEEP);
1563 		if (dlist == NULL) {
1564 			kmem_free(alist, asize);
1565 			SCTP_KSTAT(sctps, sctp_cl_assoc_change);
1566 			return (ENOMEM);
1567 		}
1568 		bcopy(&curaddr, dlist, sizeof (curaddr));
1569 		sctp_get_faddr_list(sctp, alist, asize);
1570 		(*cl_sctp_assoc_change)(sctp->sctp_family, alist, asize,
1571 		    sctp->sctp_nfaddrs, dlist, dsize, 1, SCTP_CL_PADDR,
1572 		    (cl_sctp_handle_t)sctp);
1573 		/* alist and dlist will be freed by the clustering module */
1574 	}
1575 	return (0);
1576 }
1577 
1578 /*
1579  * Returns 0 if the check failed and the restart should be refused,
1580  * 1 if the check succeeded.
1581  */
1582 int
1583 sctp_secure_restart_check(mblk_t *pkt, sctp_chunk_hdr_t *ich, uint32_t ports,
1584     int sleep, sctp_stack_t *sctps)
1585 {
1586 	sctp_faddr_t *fp, *fphead = NULL;
1587 	sctp_parm_hdr_t *ph;
1588 	ssize_t remaining;
1589 	int isv4;
1590 	ipha_t *iph;
1591 	ip6_t *ip6h;
1592 	in6_addr_t hdraddr[1];
1593 	int retval = 0;
1594 	sctp_tf_t *tf;
1595 	sctp_t *sctp;
1596 	int compres;
1597 	sctp_init_chunk_t *init;
1598 	int nadded = 0;
1599 
1600 	/* extract the address from the IP header */
1601 	isv4 = (IPH_HDR_VERSION(pkt->b_rptr) == IPV4_VERSION);
1602 	if (isv4) {
1603 		iph = (ipha_t *)pkt->b_rptr;
1604 		IN6_IPADDR_TO_V4MAPPED(iph->ipha_src, hdraddr);
1605 	} else {
1606 		ip6h = (ip6_t *)pkt->b_rptr;
1607 		hdraddr[0] = ip6h->ip6_src;
1608 	}
1609 
1610 	/* Walk the params in the INIT [ACK], pulling out addr params */
1611 	remaining = ntohs(ich->sch_len) - sizeof (*ich) -
1612 	    sizeof (sctp_init_chunk_t);
1613 	if (remaining < sizeof (*ph)) {
1614 		/* no parameters; restart OK */
1615 		return (1);
1616 	}
1617 	init = (sctp_init_chunk_t *)(ich + 1);
1618 	ph = (sctp_parm_hdr_t *)(init + 1);
1619 
1620 	while (ph != NULL) {
1621 		sctp_faddr_t *fpa = NULL;
1622 
1623 		/* params will have already been byteordered when validating */
1624 		if (ph->sph_type == htons(PARM_ADDR4)) {
1625 			if (remaining >= PARM_ADDR4_LEN) {
1626 				in6_addr_t addr;
1627 				IN6_INADDR_TO_V4MAPPED((struct in_addr *)
1628 				    (ph + 1), &addr);
1629 				fpa = kmem_cache_alloc(sctp_kmem_faddr_cache,
1630 				    sleep);
1631 				if (fpa == NULL) {
1632 					goto done;
1633 				}
1634 				bzero(fpa, sizeof (*fpa));
1635 				fpa->faddr = addr;
1636 				fpa->next = NULL;
1637 			}
1638 		} else if (ph->sph_type == htons(PARM_ADDR6)) {
1639 			if (remaining >= PARM_ADDR6_LEN) {
1640 				fpa = kmem_cache_alloc(sctp_kmem_faddr_cache,
1641 				    sleep);
1642 				if (fpa == NULL) {
1643 					goto done;
1644 				}
1645 				bzero(fpa, sizeof (*fpa));
1646 				bcopy(ph + 1, &fpa->faddr,
1647 				    sizeof (fpa->faddr));
1648 				fpa->next = NULL;
1649 			}
1650 		}
1651 		/* link in the new addr, if it was an addr param */
1652 		if (fpa != NULL) {
1653 			if (fphead == NULL) {
1654 				fphead = fpa;
1655 			} else {
1656 				fpa->next = fphead;
1657 				fphead = fpa;
1658 			}
1659 		}
1660 
1661 		ph = sctp_next_parm(ph, &remaining);
1662 	}
1663 
1664 	if (fphead == NULL) {
1665 		/* no addr parameters; restart OK */
1666 		return (1);
1667 	}
1668 
1669 	/*
1670 	 * got at least one; make sure the header's addr is
1671 	 * in the list
1672 	 */
1673 	fp = sctp_lookup_faddr_nosctp(fphead, hdraddr);
1674 	if (fp == NULL) {
1675 		/* not included; add it now */
1676 		fp = kmem_cache_alloc(sctp_kmem_faddr_cache, sleep);
1677 		if (fp == NULL) {
1678 			goto done;
1679 		}
1680 		bzero(fp, sizeof (*fp));
1681 		fp->faddr = *hdraddr;
1682 		fp->next = fphead;
1683 		fphead = fp;
1684 	}
1685 
1686 	/*
1687 	 * Now, we can finally do the check: For each sctp instance
1688 	 * on the hash line for ports, compare its faddr set against
1689 	 * the new one. If the new one is a strict subset of any
1690 	 * existing sctp's faddrs, the restart is OK. However, if there
1691 	 * is an overlap, this could be an attack, so return failure.
1692 	 * If all sctp's faddrs are disjoint, this is a legitimate new
1693 	 * association.
1694 	 */
1695 	tf = &(sctps->sctps_conn_fanout[SCTP_CONN_HASH(sctps, ports)]);
1696 	mutex_enter(&tf->tf_lock);
1697 
1698 	for (sctp = tf->tf_sctp; sctp; sctp = sctp->sctp_conn_hash_next) {
1699 		if (ports != sctp->sctp_ports) {
1700 			continue;
1701 		}
1702 		compres = sctp_compare_faddrsets(fphead, sctp->sctp_faddrs);
1703 		if (compres <= SCTP_ADDR_SUBSET) {
1704 			retval = 1;
1705 			mutex_exit(&tf->tf_lock);
1706 			goto done;
1707 		}
1708 		if (compres == SCTP_ADDR_OVERLAP) {
1709 			dprint(1,
1710 			    ("new assoc from %x:%x:%x:%x overlaps with %p\n",
1711 			    SCTP_PRINTADDR(*hdraddr), (void *)sctp));
1712 			/*
1713 			 * While we still hold the lock, we need to
1714 			 * figure out which addresses have been
1715 			 * added so we can include them in the abort
1716 			 * we will send back. Since these faddrs will
1717 			 * never be used, we overload the rto field
1718 			 * here, setting it to 0 if the address was
1719 			 * not added, 1 if it was added.
1720 			 */
1721 			for (fp = fphead; fp; fp = fp->next) {
1722 				if (sctp_lookup_faddr(sctp, &fp->faddr)) {
1723 					fp->rto = 0;
1724 				} else {
1725 					fp->rto = 1;
1726 					nadded++;
1727 				}
1728 			}
1729 			mutex_exit(&tf->tf_lock);
1730 			goto done;
1731 		}
1732 	}
1733 	mutex_exit(&tf->tf_lock);
1734 
1735 	/* All faddrs are disjoint; legit new association */
1736 	retval = 1;
1737 
1738 done:
1739 	/* If are attempted adds, send back an abort listing the addrs */
1740 	if (nadded > 0) {
1741 		void *dtail;
1742 		size_t dlen;
1743 
1744 		dtail = kmem_alloc(PARM_ADDR6_LEN * nadded, KM_NOSLEEP);
1745 		if (dtail == NULL) {
1746 			goto cleanup;
1747 		}
1748 
1749 		ph = dtail;
1750 		dlen = 0;
1751 		for (fp = fphead; fp; fp = fp->next) {
1752 			if (fp->rto == 0) {
1753 				continue;
1754 			}
1755 			if (IN6_IS_ADDR_V4MAPPED(&fp->faddr)) {
1756 				ipaddr_t addr4;
1757 
1758 				ph->sph_type = htons(PARM_ADDR4);
1759 				ph->sph_len = htons(PARM_ADDR4_LEN);
1760 				IN6_V4MAPPED_TO_IPADDR(&fp->faddr, addr4);
1761 				ph++;
1762 				bcopy(&addr4, ph, sizeof (addr4));
1763 				ph = (sctp_parm_hdr_t *)
1764 				    ((char *)ph + sizeof (addr4));
1765 				dlen += PARM_ADDR4_LEN;
1766 			} else {
1767 				ph->sph_type = htons(PARM_ADDR6);
1768 				ph->sph_len = htons(PARM_ADDR6_LEN);
1769 				ph++;
1770 				bcopy(&fp->faddr, ph, sizeof (fp->faddr));
1771 				ph = (sctp_parm_hdr_t *)
1772 				    ((char *)ph + sizeof (fp->faddr));
1773 				dlen += PARM_ADDR6_LEN;
1774 			}
1775 		}
1776 
1777 		/* Send off the abort */
1778 		sctp_send_abort(sctp, sctp_init2vtag(ich),
1779 		    SCTP_ERR_RESTART_NEW_ADDRS, dtail, dlen, pkt, 0, B_TRUE);
1780 
1781 		kmem_free(dtail, PARM_ADDR6_LEN * nadded);
1782 	}
1783 
1784 cleanup:
1785 	/* Clean up */
1786 	if (fphead) {
1787 		sctp_faddr_t *fpn;
1788 		for (fp = fphead; fp; fp = fpn) {
1789 			fpn = fp->next;
1790 			kmem_cache_free(sctp_kmem_faddr_cache, fp);
1791 		}
1792 	}
1793 
1794 	return (retval);
1795 }
1796 
1797 /*
1798  * Reset any state related to transmitted chunks.
1799  */
1800 void
1801 sctp_congest_reset(sctp_t *sctp)
1802 {
1803 	sctp_faddr_t	*fp;
1804 	sctp_stack_t	*sctps = sctp->sctp_sctps;
1805 	mblk_t		*mp;
1806 
1807 	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
1808 		fp->ssthresh = sctps->sctps_initial_mtu;
1809 		SET_CWND(fp, fp->sfa_pmss, sctps->sctps_slow_start_initial);
1810 		fp->suna = 0;
1811 		fp->pba = 0;
1812 	}
1813 	/*
1814 	 * Clean up the transmit list as well since we have reset accounting
1815 	 * on all the fps. Send event upstream, if required.
1816 	 */
1817 	while ((mp = sctp->sctp_xmit_head) != NULL) {
1818 		sctp->sctp_xmit_head = mp->b_next;
1819 		mp->b_next = NULL;
1820 		if (sctp->sctp_xmit_head != NULL)
1821 			sctp->sctp_xmit_head->b_prev = NULL;
1822 		sctp_sendfail_event(sctp, mp, 0, B_TRUE);
1823 	}
1824 	sctp->sctp_xmit_head = NULL;
1825 	sctp->sctp_xmit_tail = NULL;
1826 	sctp->sctp_xmit_unacked = NULL;
1827 
1828 	sctp->sctp_unacked = 0;
1829 	/*
1830 	 * Any control message as well. We will clean-up this list as well.
1831 	 * This contains any pending ASCONF request that we have queued/sent.
1832 	 * If we do get an ACK we will just drop it. However, given that
1833 	 * we are restarting chances are we aren't going to get any.
1834 	 */
1835 	if (sctp->sctp_cxmit_list != NULL)
1836 		sctp_asconf_free_cxmit(sctp, NULL);
1837 	sctp->sctp_cxmit_list = NULL;
1838 	sctp->sctp_cchunk_pend = 0;
1839 
1840 	sctp->sctp_rexmitting = B_FALSE;
1841 	sctp->sctp_rxt_nxttsn = 0;
1842 	sctp->sctp_rxt_maxtsn = 0;
1843 
1844 	sctp->sctp_zero_win_probe = B_FALSE;
1845 }
1846 
1847 static void
1848 sctp_init_faddr(sctp_t *sctp, sctp_faddr_t *fp, in6_addr_t *addr,
1849     mblk_t *timer_mp)
1850 {
1851 	sctp_stack_t	*sctps = sctp->sctp_sctps;
1852 
1853 	bcopy(addr, &fp->faddr, sizeof (*addr));
1854 	if (IN6_IS_ADDR_V4MAPPED(addr)) {
1855 		fp->isv4 = 1;
1856 		/* Make sure that sfa_pmss is a multiple of SCTP_ALIGN. */
1857 		fp->sfa_pmss =
1858 		    (sctps->sctps_initial_mtu - sctp->sctp_hdr_len) &
1859 		    ~(SCTP_ALIGN - 1);
1860 	} else {
1861 		fp->isv4 = 0;
1862 		fp->sfa_pmss =
1863 		    (sctps->sctps_initial_mtu - sctp->sctp_hdr6_len) &
1864 		    ~(SCTP_ALIGN - 1);
1865 	}
1866 	fp->cwnd = sctps->sctps_slow_start_initial * fp->sfa_pmss;
1867 	fp->rto = MIN(sctp->sctp_rto_initial, sctp->sctp_init_rto_max);
1868 	SCTP_MAX_RTO(sctp, fp);
1869 	fp->srtt = -1;
1870 	fp->rtt_updates = 0;
1871 	fp->strikes = 0;
1872 	fp->max_retr = sctp->sctp_pp_max_rxt;
1873 	/* Mark it as not confirmed. */
1874 	fp->state = SCTP_FADDRS_UNCONFIRMED;
1875 	fp->hb_interval = sctp->sctp_hb_interval;
1876 	fp->ssthresh = sctps->sctps_initial_ssthresh;
1877 	fp->suna = 0;
1878 	fp->pba = 0;
1879 	fp->acked = 0;
1880 	fp->lastactive = lbolt64;
1881 	fp->timer_mp = timer_mp;
1882 	fp->hb_pending = B_FALSE;
1883 	fp->hb_enabled = B_TRUE;
1884 	fp->df = 1;
1885 	fp->pmtu_discovered = 0;
1886 	fp->next = NULL;
1887 	fp->ire = NULL;
1888 	fp->T3expire = 0;
1889 	(void) random_get_pseudo_bytes((uint8_t *)&fp->hb_secret,
1890 	    sizeof (fp->hb_secret));
1891 	fp->hb_expiry = lbolt64;
1892 	fp->rxt_unacked = 0;
1893 
1894 	sctp_get_ire(sctp, fp);
1895 }
1896 
1897 /*ARGSUSED*/
1898 static int
1899 faddr_constructor(void *buf, void *arg, int flags)
1900 {
1901 	sctp_faddr_t *fp = buf;
1902 
1903 	fp->timer_mp = NULL;
1904 	fp->timer_running = 0;
1905 
1906 	fp->rc_timer_mp = NULL;
1907 	fp->rc_timer_running = 0;
1908 
1909 	return (0);
1910 }
1911 
1912 /*ARGSUSED*/
1913 static void
1914 faddr_destructor(void *buf, void *arg)
1915 {
1916 	sctp_faddr_t *fp = buf;
1917 
1918 	ASSERT(fp->timer_mp == NULL);
1919 	ASSERT(fp->timer_running == 0);
1920 
1921 	ASSERT(fp->rc_timer_mp == NULL);
1922 	ASSERT(fp->rc_timer_running == 0);
1923 }
1924 
1925 void
1926 sctp_faddr_init(void)
1927 {
1928 	sctp_kmem_faddr_cache = kmem_cache_create("sctp_faddr_cache",
1929 	    sizeof (sctp_faddr_t), 0, faddr_constructor, faddr_destructor,
1930 	    NULL, NULL, NULL, 0);
1931 }
1932 
1933 void
1934 sctp_faddr_fini(void)
1935 {
1936 	kmem_cache_destroy(sctp_kmem_faddr_cache);
1937 }
1938