xref: /titanic_41/usr/src/uts/common/inet/sctp/sctp_addr.c (revision 7cdcb8abb9b4700219e82028dac3d78699314b6d)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #pragma ident	"%Z%%M%	%I%	%E% SMI"
27 
28 #include <sys/types.h>
29 #include <sys/systm.h>
30 #include <sys/stream.h>
31 #include <sys/cmn_err.h>
32 #include <sys/ddi.h>
33 #include <sys/sunddi.h>
34 #include <sys/kmem.h>
35 #include <sys/socket.h>
36 #include <sys/sysmacros.h>
37 #include <sys/list.h>
38 
39 #include <netinet/in.h>
40 #include <netinet/ip6.h>
41 #include <netinet/sctp.h>
42 
43 #include <inet/common.h>
44 #include <inet/ip.h>
45 #include <inet/ip6.h>
46 #include <inet/ip_if.h>
47 #include <inet/ipclassifier.h>
48 #include <inet/sctp_ip.h>
49 #include "sctp_impl.h"
50 #include "sctp_addr.h"
51 
52 static void		sctp_ipif_inactive(sctp_ipif_t *);
53 static sctp_ipif_t	*sctp_lookup_ipif_addr(in6_addr_t *, boolean_t,
54 			    zoneid_t, boolean_t, uint_t, uint_t, boolean_t,
55 			    sctp_stack_t *);
56 static int		sctp_get_all_ipifs(sctp_t *, int);
57 static int		sctp_ipif_hash_insert(sctp_t *, sctp_ipif_t *, int,
58 			    boolean_t, boolean_t);
59 static void		sctp_ipif_hash_remove(sctp_t *, sctp_ipif_t *);
60 static int		sctp_compare_ipif_list(sctp_ipif_hash_t *,
61 			    sctp_ipif_hash_t *);
62 static int		sctp_copy_ipifs(sctp_ipif_hash_t *, sctp_t *, int);
63 
64 #define	SCTP_ADDR4_HASH(addr)	\
65 	(((addr) ^ ((addr) >> 8) ^ ((addr) >> 16) ^ ((addr) >> 24)) &	\
66 	(SCTP_IPIF_HASH - 1))
67 
68 #define	SCTP_ADDR6_HASH(addr)	\
69 	(((addr).s6_addr32[3] ^						\
70 	(((addr).s6_addr32[3] ^ (addr).s6_addr32[2]) >> 12)) &		\
71 	(SCTP_IPIF_HASH - 1))
72 
73 #define	SCTP_IPIF_ADDR_HASH(addr, isv6)					\
74 	((isv6) ? SCTP_ADDR6_HASH((addr)) : 				\
75 	SCTP_ADDR4_HASH((addr)._S6_un._S6_u32[3]))
76 
77 #define	SCTP_IPIF_USABLE(sctp_ipif_state)	\
78 	((sctp_ipif_state) == SCTP_IPIFS_UP ||	\
79 	(sctp_ipif_state) ==  SCTP_IPIFS_DOWN)
80 
81 #define	SCTP_IPIF_DISCARD(sctp_ipif_flags)	\
82 	((sctp_ipif_flags) & (IPIF_PRIVATE | IPIF_DEPRECATED))
83 
84 #define	SCTP_IS_IPIF_LOOPBACK(ipif)		\
85 	((ipif)->sctp_ipif_ill->sctp_ill_flags & PHYI_LOOPBACK)
86 
87 #define	SCTP_IS_IPIF_LINKLOCAL(ipif)		\
88 	((ipif)->sctp_ipif_isv6 && 		\
89 	IN6_IS_ADDR_LINKLOCAL(&(ipif)->sctp_ipif_saddr))
90 
91 #define	SCTP_UNSUPP_AF(ipif, supp_af)	\
92 	((!(ipif)->sctp_ipif_isv6 && !((supp_af) & PARM_SUPP_V4)) ||	\
93 	((ipif)->sctp_ipif_isv6 && !((supp_af) & PARM_SUPP_V6)))
94 
95 #define	SCTP_IPIF_ZONE_MATCH(sctp, ipif) 				\
96 	IPCL_ZONE_MATCH((sctp)->sctp_connp, (ipif)->sctp_ipif_zoneid)
97 
98 #define	SCTP_ILL_HASH_FN(index)		((index) % SCTP_ILL_HASH)
99 #define	SCTP_ILL_TO_PHYINDEX(ill)	((ill)->ill_phyint->phyint_ifindex)
100 
101 /*
102  * SCTP Interface list manipulation functions, locking used.
103  */
104 
105 /*
106  * Delete an SCTP IPIF from the list if the refcount goes to 0 and it is
107  * marked as condemned. Also, check if the ILL needs to go away.
108  */
109 static void
110 sctp_ipif_inactive(sctp_ipif_t *sctp_ipif)
111 {
112 	sctp_ill_t	*sctp_ill;
113 	uint_t		hindex;
114 	uint_t		ill_index;
115 	sctp_stack_t	*sctps = sctp_ipif->sctp_ipif_ill->
116 	    sctp_ill_netstack->netstack_sctp;
117 
118 	rw_enter(&sctps->sctps_g_ills_lock, RW_READER);
119 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_WRITER);
120 
121 	hindex = SCTP_IPIF_ADDR_HASH(sctp_ipif->sctp_ipif_saddr,
122 	    sctp_ipif->sctp_ipif_isv6);
123 
124 	sctp_ill = sctp_ipif->sctp_ipif_ill;
125 	ASSERT(sctp_ill != NULL);
126 	ill_index = SCTP_ILL_HASH_FN(sctp_ill->sctp_ill_index);
127 	if (sctp_ipif->sctp_ipif_state != SCTP_IPIFS_CONDEMNED ||
128 	    sctp_ipif->sctp_ipif_refcnt != 0) {
129 		rw_exit(&sctps->sctps_g_ipifs_lock);
130 		rw_exit(&sctps->sctps_g_ills_lock);
131 		return;
132 	}
133 	list_remove(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list,
134 	    sctp_ipif);
135 	sctps->sctps_g_ipifs[hindex].ipif_count--;
136 	sctps->sctps_g_ipifs_count--;
137 	rw_destroy(&sctp_ipif->sctp_ipif_lock);
138 	kmem_free(sctp_ipif, sizeof (sctp_ipif_t));
139 
140 	(void) atomic_add_32_nv(&sctp_ill->sctp_ill_ipifcnt, -1);
141 	if (rw_tryupgrade(&sctps->sctps_g_ills_lock) != 0) {
142 		rw_downgrade(&sctps->sctps_g_ipifs_lock);
143 		if (sctp_ill->sctp_ill_ipifcnt == 0 &&
144 		    sctp_ill->sctp_ill_state == SCTP_ILLS_CONDEMNED) {
145 			list_remove(&sctps->sctps_g_ills[ill_index].
146 			    sctp_ill_list, (void *)sctp_ill);
147 			sctps->sctps_g_ills[ill_index].ill_count--;
148 			sctps->sctps_ills_count--;
149 			kmem_free(sctp_ill->sctp_ill_name,
150 			    sctp_ill->sctp_ill_name_length);
151 			kmem_free(sctp_ill, sizeof (sctp_ill_t));
152 		}
153 	}
154 	rw_exit(&sctps->sctps_g_ipifs_lock);
155 	rw_exit(&sctps->sctps_g_ills_lock);
156 }
157 
158 /*
159  * Lookup an SCTP IPIF given an IP address. Increments sctp_ipif refcnt.
160  * We are either looking for a IPIF with the given address before
161  * inserting it into the global list or looking for an IPIF for an
162  * address given an SCTP. In the former case we always check the zoneid,
163  * but for the latter case, check_zid could be B_FALSE if the connp
164  * for the sctp has conn_all_zones set. When looking for an address we
165  * give preference to one that is up, so even though we may find one that
166  * is not up we keep looking if there is one up, we hold the down addr
167  * in backup_ipif in case we don't find one that is up - i.e. we return
168  * the backup_ipif in that case. Note that if we are looking for. If we
169  * are specifically looking for an up address, then usable will be set
170  * to true.
171  */
172 static sctp_ipif_t *
173 sctp_lookup_ipif_addr(in6_addr_t *addr, boolean_t refhold, zoneid_t zoneid,
174     boolean_t check_zid, uint_t ifindex, uint_t seqid, boolean_t usable,
175     sctp_stack_t *sctps)
176 {
177 	int		j;
178 	sctp_ipif_t	*sctp_ipif;
179 	sctp_ipif_t	*backup_ipif = NULL;
180 	int		hindex;
181 
182 	hindex = SCTP_IPIF_ADDR_HASH(*addr, !IN6_IS_ADDR_V4MAPPED(addr));
183 
184 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_READER);
185 	if (sctps->sctps_g_ipifs[hindex].ipif_count == 0) {
186 		rw_exit(&sctps->sctps_g_ipifs_lock);
187 		return (NULL);
188 	}
189 	sctp_ipif = list_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list);
190 	for (j = 0; j < sctps->sctps_g_ipifs[hindex].ipif_count; j++) {
191 		rw_enter(&sctp_ipif->sctp_ipif_lock, RW_READER);
192 		if ((!check_zid ||
193 		    (sctp_ipif->sctp_ipif_zoneid == ALL_ZONES ||
194 		    zoneid == sctp_ipif->sctp_ipif_zoneid)) &&
195 		    (ifindex == 0 || ifindex ==
196 		    sctp_ipif->sctp_ipif_ill->sctp_ill_index) &&
197 		    ((seqid != 0 && seqid == sctp_ipif->sctp_ipif_id) ||
198 		    (IN6_ARE_ADDR_EQUAL(&sctp_ipif->sctp_ipif_saddr,
199 		    addr)))) {
200 			if (!usable || sctp_ipif->sctp_ipif_state ==
201 			    SCTP_IPIFS_UP) {
202 				rw_exit(&sctp_ipif->sctp_ipif_lock);
203 				if (refhold)
204 					SCTP_IPIF_REFHOLD(sctp_ipif);
205 				rw_exit(&sctps->sctps_g_ipifs_lock);
206 				return (sctp_ipif);
207 			} else if (sctp_ipif->sctp_ipif_state ==
208 			    SCTP_IPIFS_DOWN && backup_ipif == NULL) {
209 				backup_ipif = sctp_ipif;
210 			}
211 		}
212 		rw_exit(&sctp_ipif->sctp_ipif_lock);
213 		sctp_ipif = list_next(
214 		    &sctps->sctps_g_ipifs[hindex].sctp_ipif_list, sctp_ipif);
215 	}
216 	if (backup_ipif != NULL) {
217 		if (refhold)
218 			SCTP_IPIF_REFHOLD(backup_ipif);
219 		rw_exit(&sctps->sctps_g_ipifs_lock);
220 		return (backup_ipif);
221 	}
222 	rw_exit(&sctps->sctps_g_ipifs_lock);
223 	return (NULL);
224 }
225 
226 /*
227  * Populate the list with all the SCTP ipifs for a given ipversion.
228  * Increments sctp_ipif refcnt.
229  * Called with no locks held.
230  */
231 static int
232 sctp_get_all_ipifs(sctp_t *sctp, int sleep)
233 {
234 	sctp_ipif_t		*sctp_ipif;
235 	int			i;
236 	int			j;
237 	int			error = 0;
238 	sctp_stack_t	*sctps = sctp->sctp_sctps;
239 
240 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_READER);
241 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
242 		if (sctps->sctps_g_ipifs[i].ipif_count == 0)
243 			continue;
244 		sctp_ipif = list_head(&sctps->sctps_g_ipifs[i].sctp_ipif_list);
245 		for (j = 0; j < sctps->sctps_g_ipifs[i].ipif_count; j++) {
246 			rw_enter(&sctp_ipif->sctp_ipif_lock, RW_READER);
247 			if (SCTP_IPIF_DISCARD(sctp_ipif->sctp_ipif_flags) ||
248 			    !SCTP_IPIF_USABLE(sctp_ipif->sctp_ipif_state) ||
249 			    !SCTP_IPIF_ZONE_MATCH(sctp, sctp_ipif) ||
250 			    (sctp->sctp_ipversion == IPV4_VERSION &&
251 			    sctp_ipif->sctp_ipif_isv6) ||
252 			    (sctp->sctp_connp->conn_ipv6_v6only &&
253 			    !sctp_ipif->sctp_ipif_isv6)) {
254 				rw_exit(&sctp_ipif->sctp_ipif_lock);
255 				sctp_ipif = list_next(
256 				    &sctps->sctps_g_ipifs[i].sctp_ipif_list,
257 				    sctp_ipif);
258 				continue;
259 			}
260 			rw_exit(&sctp_ipif->sctp_ipif_lock);
261 			SCTP_IPIF_REFHOLD(sctp_ipif);
262 			error = sctp_ipif_hash_insert(sctp, sctp_ipif, sleep,
263 			    B_FALSE, B_FALSE);
264 			if (error != 0 && error != EALREADY)
265 				goto free_stuff;
266 			sctp_ipif = list_next(
267 			    &sctps->sctps_g_ipifs[i].sctp_ipif_list,
268 			    sctp_ipif);
269 		}
270 	}
271 	rw_exit(&sctps->sctps_g_ipifs_lock);
272 	return (0);
273 free_stuff:
274 	rw_exit(&sctps->sctps_g_ipifs_lock);
275 	sctp_free_saddrs(sctp);
276 	return (ENOMEM);
277 }
278 
279 /*
280  * Given a list of address, fills in the list of SCTP ipifs if all the addresses
281  * are present in the SCTP interface list, return number of addresses filled
282  * or error. If the caller wants the list of addresses, it sends a pre-allocated
283  * buffer - list. Currently, this list is only used on a clustered node when
284  * the SCTP is in the listen state (from sctp_bind_add()). When called on a
285  * clustered node, the input is always a list of addresses (even if the
286  * original bind() was to INADDR_ANY).
287  * Called with no locks held.
288  */
289 int
290 sctp_valid_addr_list(sctp_t *sctp, const void *addrs, uint32_t addrcnt,
291     uchar_t *list, size_t lsize)
292 {
293 	struct sockaddr_in	*sin4;
294 	struct sockaddr_in6	*sin6;
295 	struct in_addr		*addr4;
296 	in6_addr_t		addr;
297 	int			cnt;
298 	int			err = 0;
299 	int			saddr_cnt = 0;
300 	sctp_ipif_t		*ipif;
301 	boolean_t		bind_to_all = B_FALSE;
302 	boolean_t		check_addrs = B_FALSE;
303 	boolean_t		check_lport = B_FALSE;
304 	uchar_t			*p = list;
305 
306 	/*
307 	 * Need to check for port and address depending on the state.
308 	 * After a socket is bound, we need to make sure that subsequent
309 	 * bindx() has correct port.  After an association is established,
310 	 * we need to check for changing the bound address to invalid
311 	 * addresses.
312 	 */
313 	if (sctp->sctp_state >= SCTPS_BOUND) {
314 		check_lport = B_TRUE;
315 		if (sctp->sctp_state > SCTPS_LISTEN)
316 			check_addrs = B_TRUE;
317 	}
318 
319 	if (sctp->sctp_conn_tfp != NULL)
320 		mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
321 	if (sctp->sctp_listen_tfp != NULL)
322 		mutex_enter(&sctp->sctp_listen_tfp->tf_lock);
323 	for (cnt = 0; cnt < addrcnt; cnt++) {
324 		boolean_t	lookup_saddr = B_TRUE;
325 		uint_t		ifindex = 0;
326 
327 		switch (sctp->sctp_family) {
328 		case AF_INET:
329 			sin4 = (struct sockaddr_in *)addrs + cnt;
330 			if (sin4->sin_family != AF_INET || (check_lport &&
331 			    sin4->sin_port != sctp->sctp_lport)) {
332 				err = EINVAL;
333 				goto free_ret;
334 			}
335 			addr4 = &sin4->sin_addr;
336 			if (check_addrs &&
337 			    (addr4->s_addr == INADDR_ANY ||
338 			    addr4->s_addr == INADDR_BROADCAST ||
339 			    IN_MULTICAST(addr4->s_addr))) {
340 				err = EINVAL;
341 				goto free_ret;
342 			}
343 			IN6_INADDR_TO_V4MAPPED(addr4, &addr);
344 			if (!check_addrs && addr4->s_addr == INADDR_ANY) {
345 				lookup_saddr = B_FALSE;
346 				bind_to_all = B_TRUE;
347 			}
348 
349 			break;
350 		case AF_INET6:
351 			sin6 = (struct sockaddr_in6 *)addrs + cnt;
352 			if (sin6->sin6_family != AF_INET6 || (check_lport &&
353 			    sin6->sin6_port != sctp->sctp_lport)) {
354 				err = EINVAL;
355 				goto free_ret;
356 			}
357 			addr = sin6->sin6_addr;
358 			/* Contains the interface index */
359 			ifindex = sin6->sin6_scope_id;
360 			if (sctp->sctp_connp->conn_ipv6_v6only &&
361 			    IN6_IS_ADDR_V4MAPPED(&addr)) {
362 				err = EAFNOSUPPORT;
363 				goto free_ret;
364 			}
365 			if (check_addrs &&
366 			    (IN6_IS_ADDR_LINKLOCAL(&addr) ||
367 			    IN6_IS_ADDR_MULTICAST(&addr) ||
368 			    IN6_IS_ADDR_UNSPECIFIED(&addr))) {
369 				err = EINVAL;
370 				goto free_ret;
371 			}
372 			if (!check_addrs && IN6_IS_ADDR_UNSPECIFIED(&addr)) {
373 				lookup_saddr = B_FALSE;
374 				bind_to_all = B_TRUE;
375 			}
376 
377 			break;
378 		default:
379 			err = EAFNOSUPPORT;
380 			goto free_ret;
381 		}
382 		if (lookup_saddr) {
383 			ipif = sctp_lookup_ipif_addr(&addr, B_TRUE,
384 			    sctp->sctp_zoneid, !sctp->sctp_connp->conn_allzones,
385 			    ifindex, 0, B_TRUE, sctp->sctp_sctps);
386 			if (ipif == NULL) {
387 				/* Address not in the list */
388 				err = EINVAL;
389 				goto free_ret;
390 			} else if (check_addrs && SCTP_IS_IPIF_LOOPBACK(ipif) &&
391 			    cl_sctp_check_addrs == NULL) {
392 				SCTP_IPIF_REFRELE(ipif);
393 				err = EINVAL;
394 				goto free_ret;
395 			}
396 		}
397 		if (!bind_to_all) {
398 			/*
399 			 * If an address is added after association setup,
400 			 * we need to wait for the peer to send us an ASCONF
401 			 * ACK before we can start using it.
402 			 * saddr_ipif_dontsrc will be reset (to 0) when we
403 			 * get the ASCONF ACK for this address.
404 			 */
405 			err = sctp_ipif_hash_insert(sctp, ipif, KM_SLEEP,
406 			    check_addrs ? B_TRUE : B_FALSE, B_FALSE);
407 			if (err != 0) {
408 				SCTP_IPIF_REFRELE(ipif);
409 				if (check_addrs && err == EALREADY)
410 					err = EADDRINUSE;
411 				goto free_ret;
412 			}
413 			saddr_cnt++;
414 			if (lsize >= sizeof (addr)) {
415 				bcopy(&addr, p, sizeof (addr));
416 				p += sizeof (addr);
417 				lsize -= sizeof (addr);
418 			}
419 		}
420 	}
421 	if (bind_to_all) {
422 		/*
423 		 * Free whatever we might have added before encountering
424 		 * inaddr_any.
425 		 */
426 		if (sctp->sctp_nsaddrs > 0) {
427 			sctp_free_saddrs(sctp);
428 			ASSERT(sctp->sctp_nsaddrs == 0);
429 		}
430 		err = sctp_get_all_ipifs(sctp, KM_SLEEP);
431 		if (err != 0)
432 			return (err);
433 		sctp->sctp_bound_to_all = 1;
434 	}
435 	if (sctp->sctp_listen_tfp != NULL)
436 		mutex_exit(&sctp->sctp_listen_tfp->tf_lock);
437 	if (sctp->sctp_conn_tfp != NULL)
438 		mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
439 	return (0);
440 free_ret:
441 	if (saddr_cnt != 0)
442 		sctp_del_saddr_list(sctp, addrs, saddr_cnt, B_TRUE);
443 	if (sctp->sctp_listen_tfp != NULL)
444 		mutex_exit(&sctp->sctp_listen_tfp->tf_lock);
445 	if (sctp->sctp_conn_tfp != NULL)
446 		mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
447 	return (err);
448 }
449 
450 static int
451 sctp_ipif_hash_insert(sctp_t *sctp, sctp_ipif_t *ipif, int sleep,
452     boolean_t dontsrc, boolean_t allow_dup)
453 {
454 	int			cnt;
455 	sctp_saddr_ipif_t	*ipif_obj;
456 	int			hindex;
457 
458 	hindex = SCTP_IPIF_ADDR_HASH(ipif->sctp_ipif_saddr,
459 	    ipif->sctp_ipif_isv6);
460 	ipif_obj = list_head(&sctp->sctp_saddrs[hindex].sctp_ipif_list);
461 	for (cnt = 0; cnt < sctp->sctp_saddrs[hindex].ipif_count; cnt++) {
462 		if (IN6_ARE_ADDR_EQUAL(&ipif_obj->saddr_ipifp->sctp_ipif_saddr,
463 		    &ipif->sctp_ipif_saddr)) {
464 			if (ipif->sctp_ipif_id !=
465 			    ipif_obj->saddr_ipifp->sctp_ipif_id &&
466 			    ipif_obj->saddr_ipifp->sctp_ipif_state ==
467 			    SCTP_IPIFS_DOWN && ipif->sctp_ipif_state ==
468 			    SCTP_IPIFS_UP) {
469 				SCTP_IPIF_REFRELE(ipif_obj->saddr_ipifp);
470 				ipif_obj->saddr_ipifp = ipif;
471 				ipif_obj->saddr_ipif_dontsrc = dontsrc ? 1 : 0;
472 				return (0);
473 			} else if (!allow_dup || ipif->sctp_ipif_id ==
474 			    ipif_obj->saddr_ipifp->sctp_ipif_id) {
475 				return (EALREADY);
476 			}
477 		}
478 		ipif_obj = list_next(&sctp->sctp_saddrs[hindex].sctp_ipif_list,
479 		    ipif_obj);
480 	}
481 	ipif_obj = kmem_zalloc(sizeof (sctp_saddr_ipif_t), sleep);
482 	if (ipif_obj == NULL) {
483 		/* Need to do something */
484 		return (ENOMEM);
485 	}
486 	ipif_obj->saddr_ipifp = ipif;
487 	ipif_obj->saddr_ipif_dontsrc = dontsrc ? 1 : 0;
488 	list_insert_tail(&sctp->sctp_saddrs[hindex].sctp_ipif_list, ipif_obj);
489 	sctp->sctp_saddrs[hindex].ipif_count++;
490 	sctp->sctp_nsaddrs++;
491 	return (0);
492 }
493 
494 static void
495 sctp_ipif_hash_remove(sctp_t *sctp, sctp_ipif_t *ipif)
496 {
497 	int			cnt;
498 	sctp_saddr_ipif_t	*ipif_obj;
499 	int			hindex;
500 
501 	hindex = SCTP_IPIF_ADDR_HASH(ipif->sctp_ipif_saddr,
502 	    ipif->sctp_ipif_isv6);
503 	ipif_obj = list_head(&sctp->sctp_saddrs[hindex].sctp_ipif_list);
504 	for (cnt = 0; cnt < sctp->sctp_saddrs[hindex].ipif_count; cnt++) {
505 		if (IN6_ARE_ADDR_EQUAL(&ipif_obj->saddr_ipifp->sctp_ipif_saddr,
506 		    &ipif->sctp_ipif_saddr)) {
507 			list_remove(&sctp->sctp_saddrs[hindex].sctp_ipif_list,
508 			    ipif_obj);
509 			sctp->sctp_saddrs[hindex].ipif_count--;
510 			sctp->sctp_nsaddrs--;
511 			SCTP_IPIF_REFRELE(ipif_obj->saddr_ipifp);
512 			kmem_free(ipif_obj, sizeof (sctp_saddr_ipif_t));
513 			break;
514 		}
515 		ipif_obj = list_next(&sctp->sctp_saddrs[hindex].sctp_ipif_list,
516 		    ipif_obj);
517 	}
518 }
519 
520 static int
521 sctp_compare_ipif_list(sctp_ipif_hash_t *list1, sctp_ipif_hash_t *list2)
522 {
523 	int			i;
524 	int			j;
525 	sctp_saddr_ipif_t	*obj1;
526 	sctp_saddr_ipif_t	*obj2;
527 	int			overlap = 0;
528 
529 	obj1 = list_head(&list1->sctp_ipif_list);
530 	for (i = 0; i < list1->ipif_count; i++) {
531 		obj2 = list_head(&list2->sctp_ipif_list);
532 		for (j = 0; j < list2->ipif_count; j++) {
533 			if (IN6_ARE_ADDR_EQUAL(
534 			    &obj1->saddr_ipifp->sctp_ipif_saddr,
535 			    &obj2->saddr_ipifp->sctp_ipif_saddr)) {
536 				overlap++;
537 				break;
538 			}
539 			obj2 = list_next(&list2->sctp_ipif_list,
540 			    obj2);
541 		}
542 		obj1 = list_next(&list1->sctp_ipif_list, obj1);
543 	}
544 	return (overlap);
545 }
546 
547 int
548 sctp_compare_saddrs(sctp_t *sctp1, sctp_t *sctp2)
549 {
550 	int		i;
551 	int		overlap = 0;
552 
553 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
554 		overlap += sctp_compare_ipif_list(&sctp1->sctp_saddrs[i],
555 		    &sctp2->sctp_saddrs[i]);
556 	}
557 
558 	if (sctp1->sctp_nsaddrs == sctp2->sctp_nsaddrs &&
559 	    overlap == sctp1->sctp_nsaddrs) {
560 		return (SCTP_ADDR_EQUAL);
561 	}
562 
563 	if (overlap == sctp1->sctp_nsaddrs)
564 		return (SCTP_ADDR_SUBSET);
565 
566 	if (overlap > 0)
567 		return (SCTP_ADDR_OVERLAP);
568 
569 	return (SCTP_ADDR_DISJOINT);
570 }
571 
572 static int
573 sctp_copy_ipifs(sctp_ipif_hash_t *list1, sctp_t *sctp2, int sleep)
574 {
575 	int			i;
576 	sctp_saddr_ipif_t	*obj;
577 	int			error = 0;
578 
579 	obj = list_head(&list1->sctp_ipif_list);
580 	for (i = 0; i < list1->ipif_count; i++) {
581 		SCTP_IPIF_REFHOLD(obj->saddr_ipifp);
582 		error = sctp_ipif_hash_insert(sctp2, obj->saddr_ipifp, sleep,
583 		    B_FALSE, B_FALSE);
584 		ASSERT(error != EALREADY);
585 		if (error != 0)
586 			return (error);
587 		obj = list_next(&list1->sctp_ipif_list, obj);
588 	}
589 	return (error);
590 }
591 
592 int
593 sctp_dup_saddrs(sctp_t *sctp1, sctp_t *sctp2, int sleep)
594 {
595 	int	error = 0;
596 	int	i;
597 
598 	if (sctp1 == NULL || sctp1->sctp_bound_to_all == 1)
599 		return (sctp_get_all_ipifs(sctp2, sleep));
600 
601 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
602 		if (sctp1->sctp_saddrs[i].ipif_count == 0)
603 			continue;
604 		error = sctp_copy_ipifs(&sctp1->sctp_saddrs[i], sctp2, sleep);
605 		if (error != 0) {
606 			sctp_free_saddrs(sctp2);
607 			return (error);
608 		}
609 	}
610 	return (0);
611 }
612 
613 void
614 sctp_free_saddrs(sctp_t *sctp)
615 {
616 	int			i;
617 	int			l;
618 	sctp_saddr_ipif_t	*obj;
619 
620 	if (sctp->sctp_nsaddrs == 0)
621 		return;
622 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
623 		if (sctp->sctp_saddrs[i].ipif_count == 0)
624 			continue;
625 		obj = list_tail(&sctp->sctp_saddrs[i].sctp_ipif_list);
626 		for (l = 0; l < sctp->sctp_saddrs[i].ipif_count; l++) {
627 			list_remove(&sctp->sctp_saddrs[i].sctp_ipif_list, obj);
628 			SCTP_IPIF_REFRELE(obj->saddr_ipifp);
629 			sctp->sctp_nsaddrs--;
630 			kmem_free(obj, sizeof (sctp_saddr_ipif_t));
631 			obj = list_tail(&sctp->sctp_saddrs[i].sctp_ipif_list);
632 		}
633 		sctp->sctp_saddrs[i].ipif_count = 0;
634 	}
635 	if (sctp->sctp_bound_to_all == 1)
636 		sctp->sctp_bound_to_all = 0;
637 	ASSERT(sctp->sctp_nsaddrs == 0);
638 }
639 
640 /*
641  * Add/Delete the given ILL from the SCTP ILL list. Called with no locks
642  * held.
643  */
644 void
645 sctp_update_ill(ill_t *ill, int op)
646 {
647 	int		i;
648 	sctp_ill_t	*sctp_ill = NULL;
649 	uint_t		index;
650 	netstack_t	*ns = ill->ill_ipst->ips_netstack;
651 	sctp_stack_t	*sctps = ns->netstack_sctp;
652 
653 	rw_enter(&sctps->sctps_g_ills_lock, RW_WRITER);
654 
655 	index = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(ill));
656 	sctp_ill = list_head(&sctps->sctps_g_ills[index].sctp_ill_list);
657 	for (i = 0; i < sctps->sctps_g_ills[index].ill_count; i++) {
658 		if ((sctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(ill)) &&
659 		    (sctp_ill->sctp_ill_isv6 == ill->ill_isv6)) {
660 			break;
661 		}
662 		sctp_ill = list_next(&sctps->sctps_g_ills[index].sctp_ill_list,
663 		    sctp_ill);
664 	}
665 
666 	switch (op) {
667 	case SCTP_ILL_INSERT:
668 		if (sctp_ill != NULL) {
669 			/* Unmark it if it is condemned */
670 			if (sctp_ill->sctp_ill_state == SCTP_ILLS_CONDEMNED)
671 				sctp_ill->sctp_ill_state = 0;
672 			rw_exit(&sctps->sctps_g_ills_lock);
673 			return;
674 		}
675 		sctp_ill = kmem_zalloc(sizeof (sctp_ill_t), KM_NOSLEEP);
676 		/* Need to re-try? */
677 		if (sctp_ill == NULL) {
678 			cmn_err(CE_WARN, "sctp_update_ill: error adding "
679 			    "ILL %p to SCTP's ILL list", (void *)ill);
680 			rw_exit(&sctps->sctps_g_ills_lock);
681 			return;
682 		}
683 		sctp_ill->sctp_ill_name = kmem_zalloc(ill->ill_name_length,
684 		    KM_NOSLEEP);
685 		if (sctp_ill->sctp_ill_name == NULL) {
686 			cmn_err(CE_WARN, "sctp_update_ill: error adding "
687 			    "ILL %p to SCTP's ILL list", (void *)ill);
688 			kmem_free(sctp_ill, sizeof (sctp_ill_t));
689 			rw_exit(&sctps->sctps_g_ills_lock);
690 			return;
691 		}
692 		bcopy(ill->ill_name, sctp_ill->sctp_ill_name,
693 		    ill->ill_name_length);
694 		sctp_ill->sctp_ill_name_length = ill->ill_name_length;
695 		sctp_ill->sctp_ill_index = SCTP_ILL_TO_PHYINDEX(ill);
696 		sctp_ill->sctp_ill_flags = ill->ill_phyint->phyint_flags;
697 		sctp_ill->sctp_ill_netstack = ns;	/* No netstack_hold */
698 		sctp_ill->sctp_ill_isv6 = ill->ill_isv6;
699 		list_insert_tail(&sctps->sctps_g_ills[index].sctp_ill_list,
700 		    (void *)sctp_ill);
701 		sctps->sctps_g_ills[index].ill_count++;
702 		sctps->sctps_ills_count++;
703 
704 		break;
705 
706 	case SCTP_ILL_REMOVE:
707 
708 		if (sctp_ill == NULL) {
709 			rw_exit(&sctps->sctps_g_ills_lock);
710 			return;
711 		}
712 		if (sctp_ill->sctp_ill_ipifcnt == 0) {
713 			list_remove(&sctps->sctps_g_ills[index].sctp_ill_list,
714 			    (void *)sctp_ill);
715 			sctps->sctps_g_ills[index].ill_count--;
716 			sctps->sctps_ills_count--;
717 			kmem_free(sctp_ill->sctp_ill_name,
718 			    ill->ill_name_length);
719 			kmem_free(sctp_ill, sizeof (sctp_ill_t));
720 		} else {
721 			sctp_ill->sctp_ill_state = SCTP_ILLS_CONDEMNED;
722 		}
723 
724 		break;
725 	}
726 	rw_exit(&sctps->sctps_g_ills_lock);
727 }
728 
729 /*
730  * The ILL's index is being changed, just remove it from the old list,
731  * change the SCTP ILL's index and re-insert using the new index.
732  */
733 void
734 sctp_ill_reindex(ill_t *ill, uint_t orig_ill_index)
735 {
736 	sctp_ill_t	*sctp_ill = NULL;
737 	sctp_ill_t	*nxt_sill;
738 	uint_t		indx;
739 	uint_t		nindx;
740 	boolean_t	once = B_FALSE;
741 	netstack_t	*ns = ill->ill_ipst->ips_netstack;
742 	sctp_stack_t	*sctps = ns->netstack_sctp;
743 
744 	rw_enter(&sctps->sctps_g_ills_lock, RW_WRITER);
745 
746 	indx = SCTP_ILL_HASH_FN(orig_ill_index);
747 	nindx = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(ill));
748 	sctp_ill = list_head(&sctps->sctps_g_ills[indx].sctp_ill_list);
749 	while (sctp_ill != NULL) {
750 		nxt_sill = list_next(&sctps->sctps_g_ills[indx].sctp_ill_list,
751 		    sctp_ill);
752 		if (sctp_ill->sctp_ill_index == orig_ill_index) {
753 			sctp_ill->sctp_ill_index = SCTP_ILL_TO_PHYINDEX(ill);
754 			/*
755 			 * if the new index hashes to the same value, all's
756 			 * done.
757 			 */
758 			if (nindx != indx) {
759 				list_remove(
760 				    &sctps->sctps_g_ills[indx].sctp_ill_list,
761 				    (void *)sctp_ill);
762 				sctps->sctps_g_ills[indx].ill_count--;
763 				list_insert_tail(
764 				    &sctps->sctps_g_ills[nindx].sctp_ill_list,
765 				    (void *)sctp_ill);
766 				sctps->sctps_g_ills[nindx].ill_count++;
767 			}
768 			if (once)
769 				break;
770 			/* We might have one for v4 and for v6 */
771 			once = B_TRUE;
772 		}
773 		sctp_ill = nxt_sill;
774 	}
775 	rw_exit(&sctps->sctps_g_ills_lock);
776 }
777 
778 /* move ipif from f_ill to t_ill */
779 void
780 sctp_move_ipif(ipif_t *ipif, ill_t *f_ill, ill_t *t_ill)
781 {
782 	sctp_ill_t	*fsctp_ill = NULL;
783 	sctp_ill_t	*tsctp_ill = NULL;
784 	sctp_ipif_t	*sctp_ipif;
785 	uint_t		hindex;
786 	int		i;
787 	netstack_t	*ns = ipif->ipif_ill->ill_ipst->ips_netstack;
788 	sctp_stack_t	*sctps = ns->netstack_sctp;
789 
790 	rw_enter(&sctps->sctps_g_ills_lock, RW_READER);
791 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_READER);
792 
793 	hindex = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(f_ill));
794 	fsctp_ill = list_head(&sctps->sctps_g_ills[hindex].sctp_ill_list);
795 	for (i = 0; i < sctps->sctps_g_ills[hindex].ill_count; i++) {
796 		if (fsctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(f_ill) &&
797 		    fsctp_ill->sctp_ill_isv6 == f_ill->ill_isv6) {
798 			break;
799 		}
800 		fsctp_ill = list_next(
801 		    &sctps->sctps_g_ills[hindex].sctp_ill_list, fsctp_ill);
802 	}
803 
804 	hindex = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(t_ill));
805 	tsctp_ill = list_head(&sctps->sctps_g_ills[hindex].sctp_ill_list);
806 	for (i = 0; i < sctps->sctps_g_ills[hindex].ill_count; i++) {
807 		if (tsctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(t_ill) &&
808 		    tsctp_ill->sctp_ill_isv6 == t_ill->ill_isv6) {
809 			break;
810 		}
811 		tsctp_ill = list_next(
812 		    &sctps->sctps_g_ills[hindex].sctp_ill_list, tsctp_ill);
813 	}
814 
815 	hindex = SCTP_IPIF_ADDR_HASH(ipif->ipif_v6lcl_addr,
816 	    ipif->ipif_ill->ill_isv6);
817 	sctp_ipif = list_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list);
818 	for (i = 0; i < sctps->sctps_g_ipifs[hindex].ipif_count; i++) {
819 		if (sctp_ipif->sctp_ipif_id == ipif->ipif_seqid)
820 			break;
821 		sctp_ipif = list_next(
822 		    &sctps->sctps_g_ipifs[hindex].sctp_ipif_list, sctp_ipif);
823 	}
824 	/* Should be an ASSERT? */
825 	if (fsctp_ill == NULL || tsctp_ill == NULL || sctp_ipif == NULL) {
826 		ip1dbg(("sctp_move_ipif: error moving ipif %p from %p to %p\n",
827 		    (void *)ipif, (void *)f_ill, (void *)t_ill));
828 		rw_exit(&sctps->sctps_g_ipifs_lock);
829 		rw_exit(&sctps->sctps_g_ills_lock);
830 		return;
831 	}
832 	rw_enter(&sctp_ipif->sctp_ipif_lock, RW_WRITER);
833 	ASSERT(sctp_ipif->sctp_ipif_ill == fsctp_ill);
834 	sctp_ipif->sctp_ipif_ill = tsctp_ill;
835 	rw_exit(&sctp_ipif->sctp_ipif_lock);
836 	(void) atomic_add_32_nv(&fsctp_ill->sctp_ill_ipifcnt, -1);
837 	atomic_add_32(&tsctp_ill->sctp_ill_ipifcnt, 1);
838 	rw_exit(&sctps->sctps_g_ipifs_lock);
839 	rw_exit(&sctps->sctps_g_ills_lock);
840 }
841 
842 /*
843  * Walk the list of SCTPs and find each that has oipif in it's saddr list, and
844  * if so replace it with nipif.
845  */
846 void
847 sctp_update_saddrs(sctp_ipif_t *oipif, sctp_ipif_t *nipif, int idx,
848     sctp_stack_t *sctps)
849 {
850 	sctp_t			*sctp;
851 	sctp_t			*sctp_prev = NULL;
852 	sctp_saddr_ipif_t	*sobj;
853 	int			count;
854 
855 	sctp = sctps->sctps_gsctp;
856 	mutex_enter(&sctps->sctps_g_lock);
857 	while (sctp != NULL && oipif->sctp_ipif_refcnt > 0) {
858 		mutex_enter(&sctp->sctp_reflock);
859 		if (sctp->sctp_condemned ||
860 		    sctp->sctp_saddrs[idx].ipif_count <= 0) {
861 			mutex_exit(&sctp->sctp_reflock);
862 			sctp = list_next(&sctps->sctps_g_list, sctp);
863 			continue;
864 		}
865 		sctp->sctp_refcnt++;
866 		mutex_exit(&sctp->sctp_reflock);
867 		mutex_exit(&sctps->sctps_g_lock);
868 		if (sctp_prev != NULL)
869 			SCTP_REFRELE(sctp_prev);
870 
871 		RUN_SCTP(sctp);
872 		sobj = list_head(&sctp->sctp_saddrs[idx].sctp_ipif_list);
873 		for (count = 0; count <
874 		    sctp->sctp_saddrs[idx].ipif_count; count++) {
875 			if (sobj->saddr_ipifp == oipif) {
876 				SCTP_IPIF_REFHOLD(nipif);
877 				sobj->saddr_ipifp = nipif;
878 				ASSERT(oipif->sctp_ipif_refcnt > 0);
879 				/* We have the writer lock */
880 				oipif->sctp_ipif_refcnt--;
881 				/*
882 				 * Can't have more than one referring
883 				 * to the same sctp_ipif.
884 				 */
885 				break;
886 			}
887 			sobj = list_next(&sctp->sctp_saddrs[idx].sctp_ipif_list,
888 			    sobj);
889 		}
890 		WAKE_SCTP(sctp);
891 		sctp_prev = sctp;
892 		mutex_enter(&sctps->sctps_g_lock);
893 		sctp = list_next(&sctps->sctps_g_list, sctp);
894 	}
895 	mutex_exit(&sctps->sctps_g_lock);
896 	if (sctp_prev != NULL)
897 		SCTP_REFRELE(sctp_prev);
898 }
899 
900 /*
901  * Given an ipif, walk the hash list in the global ipif table and for
902  * any other SCTP ipif with the same address and non-zero reference, walk
903  * the SCTP list and update the saddr list, if required, to point to the
904  * new SCTP ipif.
905  */
906 void
907 sctp_chk_and_updt_saddr(int hindex, sctp_ipif_t *ipif, sctp_stack_t *sctps)
908 {
909 	int		cnt;
910 	sctp_ipif_t	*sipif;
911 
912 	ASSERT(sctps->sctps_g_ipifs[hindex].ipif_count > 0);
913 	ASSERT(ipif->sctp_ipif_state == SCTP_IPIFS_UP);
914 
915 	sipif = list_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list);
916 	for (cnt = 0; cnt < sctps->sctps_g_ipifs[hindex].ipif_count; cnt++) {
917 		rw_enter(&sipif->sctp_ipif_lock, RW_WRITER);
918 		if (sipif->sctp_ipif_id != ipif->sctp_ipif_id &&
919 		    IN6_ARE_ADDR_EQUAL(&sipif->sctp_ipif_saddr,
920 		    &ipif->sctp_ipif_saddr) && sipif->sctp_ipif_refcnt > 0) {
921 			/*
922 			 * There can only be one address up at any time
923 			 * and we are here because ipif has been brought
924 			 * up.
925 			 */
926 			ASSERT(sipif->sctp_ipif_state != SCTP_IPIFS_UP);
927 			/*
928 			 * Someone has a reference to this we need to update to
929 			 * point to the new sipif.
930 			 */
931 			sctp_update_saddrs(sipif, ipif, hindex, sctps);
932 		}
933 		rw_exit(&sipif->sctp_ipif_lock);
934 		sipif = list_next(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list,
935 		    sipif);
936 	}
937 }
938 
939 /*
940  * Insert a new SCTP ipif using 'ipif'. v6addr is the address that existed
941  * prior to the current address in 'ipif'. Only when an existing address
942  * is changed on an IPIF, will v6addr be specified. If the IPIF already
943  * exists in the global SCTP ipif table, then we either removed it, if
944  * it doesn't have any existing reference, or mark it condemned otherwise.
945  * If an address is being brought up (IPIF_UP), then we need to scan
946  * the SCTP list to check if there is any SCTP that points to the *same*
947  * address on a different SCTP ipif and update in that case.
948  */
949 void
950 sctp_update_ipif_addr(ipif_t *ipif, in6_addr_t v6addr)
951 {
952 	ill_t		*ill = ipif->ipif_ill;
953 	int		i;
954 	sctp_ill_t	*sctp_ill;
955 	sctp_ill_t	*osctp_ill;
956 	sctp_ipif_t	*sctp_ipif = NULL;
957 	sctp_ipif_t	*osctp_ipif = NULL;
958 	uint_t		ill_index;
959 	int		hindex;
960 	sctp_stack_t	*sctps;
961 
962 
963 	sctps = ipif->ipif_ill->ill_ipst->ips_netstack->netstack_sctp;
964 
965 	/* Index for new address */
966 	hindex = SCTP_IPIF_ADDR_HASH(ipif->ipif_v6lcl_addr, ill->ill_isv6);
967 
968 	/*
969 	 * The address on this IPIF is changing, we need to look for
970 	 * this old address and mark it condemned, before creating
971 	 * one for the new address.
972 	 */
973 	osctp_ipif = sctp_lookup_ipif_addr(&v6addr, B_FALSE,
974 	    ipif->ipif_zoneid, B_TRUE, SCTP_ILL_TO_PHYINDEX(ill),
975 	    ipif->ipif_seqid, B_FALSE, sctps);
976 
977 	rw_enter(&sctps->sctps_g_ills_lock, RW_READER);
978 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_WRITER);
979 
980 	ill_index = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(ill));
981 	sctp_ill = list_head(&sctps->sctps_g_ills[ill_index].sctp_ill_list);
982 	for (i = 0; i < sctps->sctps_g_ills[ill_index].ill_count; i++) {
983 		if (sctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(ill) &&
984 		    sctp_ill->sctp_ill_isv6 == ill->ill_isv6) {
985 			break;
986 		}
987 		sctp_ill = list_next(
988 		    &sctps->sctps_g_ills[ill_index].sctp_ill_list, sctp_ill);
989 	}
990 
991 	if (sctp_ill == NULL) {
992 		ip1dbg(("sctp_update_ipif_addr: ill not found ..\n"));
993 		rw_exit(&sctps->sctps_g_ipifs_lock);
994 		rw_exit(&sctps->sctps_g_ills_lock);
995 		return;
996 	}
997 
998 	if (osctp_ipif != NULL) {
999 
1000 		/* The address is the same? */
1001 		if (IN6_ARE_ADDR_EQUAL(&ipif->ipif_v6lcl_addr, &v6addr)) {
1002 			boolean_t	chk_n_updt = B_FALSE;
1003 
1004 			rw_downgrade(&sctps->sctps_g_ipifs_lock);
1005 			rw_enter(&osctp_ipif->sctp_ipif_lock, RW_WRITER);
1006 			if (ipif->ipif_flags & IPIF_UP &&
1007 			    osctp_ipif->sctp_ipif_state != SCTP_IPIFS_UP) {
1008 				osctp_ipif->sctp_ipif_state = SCTP_IPIFS_UP;
1009 				chk_n_updt = B_TRUE;
1010 			} else {
1011 				osctp_ipif->sctp_ipif_state = SCTP_IPIFS_DOWN;
1012 			}
1013 			osctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1014 			rw_exit(&osctp_ipif->sctp_ipif_lock);
1015 			if (chk_n_updt) {
1016 				sctp_chk_and_updt_saddr(hindex, osctp_ipif,
1017 				    sctps);
1018 			}
1019 			rw_exit(&sctps->sctps_g_ipifs_lock);
1020 			rw_exit(&sctps->sctps_g_ills_lock);
1021 			return;
1022 		}
1023 		/*
1024 		 * We are effectively removing this address from the ILL.
1025 		 */
1026 		if (osctp_ipif->sctp_ipif_refcnt != 0) {
1027 			osctp_ipif->sctp_ipif_state = SCTP_IPIFS_CONDEMNED;
1028 		} else {
1029 			list_t		*ipif_list;
1030 			int		ohindex;
1031 
1032 			osctp_ill = osctp_ipif->sctp_ipif_ill;
1033 			/* hash index for the old one */
1034 			ohindex = SCTP_IPIF_ADDR_HASH(
1035 			    osctp_ipif->sctp_ipif_saddr,
1036 			    osctp_ipif->sctp_ipif_isv6);
1037 
1038 			ipif_list =
1039 			    &sctps->sctps_g_ipifs[ohindex].sctp_ipif_list;
1040 
1041 			list_remove(ipif_list, (void *)osctp_ipif);
1042 			sctps->sctps_g_ipifs[ohindex].ipif_count--;
1043 			sctps->sctps_g_ipifs_count--;
1044 			rw_destroy(&osctp_ipif->sctp_ipif_lock);
1045 			kmem_free(osctp_ipif, sizeof (sctp_ipif_t));
1046 			(void) atomic_add_32_nv(&osctp_ill->sctp_ill_ipifcnt,
1047 			    -1);
1048 		}
1049 	}
1050 
1051 	sctp_ipif = kmem_zalloc(sizeof (sctp_ipif_t), KM_NOSLEEP);
1052 	/* Try again? */
1053 	if (sctp_ipif == NULL) {
1054 		cmn_err(CE_WARN, "sctp_update_ipif_addr: error adding "
1055 		    "IPIF %p to SCTP's IPIF list", (void *)ipif);
1056 		rw_exit(&sctps->sctps_g_ipifs_lock);
1057 		rw_exit(&sctps->sctps_g_ills_lock);
1058 		return;
1059 	}
1060 	sctps->sctps_g_ipifs_count++;
1061 	rw_init(&sctp_ipif->sctp_ipif_lock, NULL, RW_DEFAULT, NULL);
1062 	sctp_ipif->sctp_ipif_saddr = ipif->ipif_v6lcl_addr;
1063 	sctp_ipif->sctp_ipif_ill = sctp_ill;
1064 	sctp_ipif->sctp_ipif_isv6 = ill->ill_isv6;
1065 	sctp_ipif->sctp_ipif_zoneid = ipif->ipif_zoneid;
1066 	sctp_ipif->sctp_ipif_id = ipif->ipif_seqid;
1067 	if (ipif->ipif_flags & IPIF_UP)
1068 		sctp_ipif->sctp_ipif_state = SCTP_IPIFS_UP;
1069 	else
1070 		sctp_ipif->sctp_ipif_state = SCTP_IPIFS_DOWN;
1071 	sctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1072 	/*
1073 	 * We add it to the head so that it is quicker to find good/recent
1074 	 * additions.
1075 	 */
1076 	list_insert_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list,
1077 	    (void *)sctp_ipif);
1078 	sctps->sctps_g_ipifs[hindex].ipif_count++;
1079 	atomic_add_32(&sctp_ill->sctp_ill_ipifcnt, 1);
1080 	if (sctp_ipif->sctp_ipif_state == SCTP_IPIFS_UP)
1081 		sctp_chk_and_updt_saddr(hindex, sctp_ipif, sctps);
1082 	rw_exit(&sctps->sctps_g_ipifs_lock);
1083 	rw_exit(&sctps->sctps_g_ills_lock);
1084 }
1085 
1086 /* Insert, Remove,  Mark up or Mark down the ipif */
1087 void
1088 sctp_update_ipif(ipif_t *ipif, int op)
1089 {
1090 	ill_t		*ill = ipif->ipif_ill;
1091 	int		i;
1092 	sctp_ill_t	*sctp_ill;
1093 	sctp_ipif_t	*sctp_ipif;
1094 	uint_t		ill_index;
1095 	uint_t		hindex;
1096 	netstack_t	*ns = ipif->ipif_ill->ill_ipst->ips_netstack;
1097 	sctp_stack_t	*sctps = ns->netstack_sctp;
1098 
1099 	ip2dbg(("sctp_update_ipif: %s %d\n", ill->ill_name, ipif->ipif_seqid));
1100 
1101 	rw_enter(&sctps->sctps_g_ills_lock, RW_READER);
1102 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_WRITER);
1103 
1104 	ill_index = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(ill));
1105 	sctp_ill = list_head(&sctps->sctps_g_ills[ill_index].sctp_ill_list);
1106 	for (i = 0; i < sctps->sctps_g_ills[ill_index].ill_count; i++) {
1107 		if (sctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(ill) &&
1108 		    sctp_ill->sctp_ill_isv6 == ill->ill_isv6) {
1109 			break;
1110 		}
1111 		sctp_ill = list_next(
1112 		    &sctps->sctps_g_ills[ill_index].sctp_ill_list, sctp_ill);
1113 	}
1114 	if (sctp_ill == NULL) {
1115 		rw_exit(&sctps->sctps_g_ipifs_lock);
1116 		rw_exit(&sctps->sctps_g_ills_lock);
1117 		return;
1118 	}
1119 
1120 	hindex = SCTP_IPIF_ADDR_HASH(ipif->ipif_v6lcl_addr,
1121 	    ipif->ipif_ill->ill_isv6);
1122 	sctp_ipif = list_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list);
1123 	for (i = 0; i < sctps->sctps_g_ipifs[hindex].ipif_count; i++) {
1124 		if (sctp_ipif->sctp_ipif_id == ipif->ipif_seqid) {
1125 			ASSERT(IN6_ARE_ADDR_EQUAL(&sctp_ipif->sctp_ipif_saddr,
1126 			    &ipif->ipif_v6lcl_addr));
1127 			break;
1128 		}
1129 		sctp_ipif = list_next(
1130 		    &sctps->sctps_g_ipifs[hindex].sctp_ipif_list,
1131 		    sctp_ipif);
1132 	}
1133 	if (sctp_ipif == NULL) {
1134 		ip1dbg(("sctp_update_ipif: null sctp_ipif for %d\n", op));
1135 		rw_exit(&sctps->sctps_g_ipifs_lock);
1136 		rw_exit(&sctps->sctps_g_ills_lock);
1137 		return;
1138 	}
1139 	ASSERT(sctp_ill == sctp_ipif->sctp_ipif_ill);
1140 	switch (op) {
1141 	case SCTP_IPIF_REMOVE:
1142 	{
1143 		list_t		*ipif_list;
1144 		list_t		*ill_list;
1145 
1146 		ill_list = &sctps->sctps_g_ills[ill_index].sctp_ill_list;
1147 		ipif_list = &sctps->sctps_g_ipifs[hindex].sctp_ipif_list;
1148 		if (sctp_ipif->sctp_ipif_refcnt != 0) {
1149 			sctp_ipif->sctp_ipif_state = SCTP_IPIFS_CONDEMNED;
1150 			rw_exit(&sctps->sctps_g_ipifs_lock);
1151 			rw_exit(&sctps->sctps_g_ills_lock);
1152 			return;
1153 		}
1154 		list_remove(ipif_list, (void *)sctp_ipif);
1155 		sctps->sctps_g_ipifs[hindex].ipif_count--;
1156 		sctps->sctps_g_ipifs_count--;
1157 		rw_destroy(&sctp_ipif->sctp_ipif_lock);
1158 		kmem_free(sctp_ipif, sizeof (sctp_ipif_t));
1159 		(void) atomic_add_32_nv(&sctp_ill->sctp_ill_ipifcnt, -1);
1160 		if (rw_tryupgrade(&sctps->sctps_g_ills_lock) != 0) {
1161 			rw_downgrade(&sctps->sctps_g_ipifs_lock);
1162 			if (sctp_ill->sctp_ill_ipifcnt == 0 &&
1163 			    sctp_ill->sctp_ill_state == SCTP_ILLS_CONDEMNED) {
1164 				list_remove(ill_list, (void *)sctp_ill);
1165 				sctps->sctps_ills_count--;
1166 				sctps->sctps_g_ills[ill_index].ill_count--;
1167 				kmem_free(sctp_ill->sctp_ill_name,
1168 				    sctp_ill->sctp_ill_name_length);
1169 				kmem_free(sctp_ill, sizeof (sctp_ill_t));
1170 			}
1171 		}
1172 		break;
1173 	}
1174 
1175 	case SCTP_IPIF_UP:
1176 
1177 		rw_downgrade(&sctps->sctps_g_ipifs_lock);
1178 		rw_enter(&sctp_ipif->sctp_ipif_lock, RW_WRITER);
1179 		sctp_ipif->sctp_ipif_state = SCTP_IPIFS_UP;
1180 		sctp_ipif->sctp_ipif_mtu = ipif->ipif_mtu;
1181 		sctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1182 		rw_exit(&sctp_ipif->sctp_ipif_lock);
1183 		sctp_chk_and_updt_saddr(hindex, sctp_ipif,
1184 		    ipif->ipif_ill->ill_ipst->ips_netstack->netstack_sctp);
1185 
1186 		break;
1187 
1188 	case SCTP_IPIF_UPDATE:
1189 
1190 		rw_downgrade(&sctps->sctps_g_ipifs_lock);
1191 		rw_enter(&sctp_ipif->sctp_ipif_lock, RW_WRITER);
1192 		sctp_ipif->sctp_ipif_mtu = ipif->ipif_mtu;
1193 		sctp_ipif->sctp_ipif_zoneid = ipif->ipif_zoneid;
1194 		sctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1195 		rw_exit(&sctp_ipif->sctp_ipif_lock);
1196 
1197 		break;
1198 
1199 	case SCTP_IPIF_DOWN:
1200 
1201 		rw_downgrade(&sctps->sctps_g_ipifs_lock);
1202 		rw_enter(&sctp_ipif->sctp_ipif_lock, RW_WRITER);
1203 		sctp_ipif->sctp_ipif_state = SCTP_IPIFS_DOWN;
1204 		sctp_ipif->sctp_ipif_mtu = ipif->ipif_mtu;
1205 		sctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1206 		rw_exit(&sctp_ipif->sctp_ipif_lock);
1207 
1208 		break;
1209 	}
1210 	rw_exit(&sctps->sctps_g_ipifs_lock);
1211 	rw_exit(&sctps->sctps_g_ills_lock);
1212 }
1213 
1214 /*
1215  * SCTP source address list manipulaton, locking not used (except for
1216  * sctp locking by the caller.
1217  */
1218 
1219 /* Remove a specific saddr from the list */
1220 void
1221 sctp_del_saddr(sctp_t *sctp, sctp_saddr_ipif_t *sp)
1222 {
1223 	if (sctp->sctp_conn_tfp != NULL)
1224 		mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
1225 
1226 	if (sctp->sctp_listen_tfp != NULL)
1227 		mutex_enter(&sctp->sctp_listen_tfp->tf_lock);
1228 
1229 	sctp_ipif_hash_remove(sctp, sp->saddr_ipifp);
1230 
1231 	if (sctp->sctp_bound_to_all == 1)
1232 		sctp->sctp_bound_to_all = 0;
1233 
1234 	if (sctp->sctp_conn_tfp != NULL)
1235 		mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
1236 
1237 	if (sctp->sctp_listen_tfp != NULL)
1238 		mutex_exit(&sctp->sctp_listen_tfp->tf_lock);
1239 }
1240 
1241 /*
1242  * Delete source address from the existing list. No error checking done here
1243  * Called with no locks held.
1244  */
1245 void
1246 sctp_del_saddr_list(sctp_t *sctp, const void *addrs, int addcnt,
1247     boolean_t fanout_locked)
1248 {
1249 	struct sockaddr_in	*sin4;
1250 	struct sockaddr_in6	*sin6;
1251 	int			cnt;
1252 	in6_addr_t		addr;
1253 	sctp_ipif_t		*sctp_ipif;
1254 	int			ifindex = 0;
1255 
1256 	ASSERT(sctp->sctp_nsaddrs >= addcnt);
1257 
1258 	if (!fanout_locked) {
1259 		if (sctp->sctp_conn_tfp != NULL)
1260 			mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
1261 		if (sctp->sctp_listen_tfp != NULL)
1262 			mutex_enter(&sctp->sctp_listen_tfp->tf_lock);
1263 	}
1264 
1265 	for (cnt = 0; cnt < addcnt; cnt++) {
1266 		switch (sctp->sctp_family) {
1267 		case AF_INET:
1268 			sin4 = (struct sockaddr_in *)addrs + cnt;
1269 			IN6_INADDR_TO_V4MAPPED(&sin4->sin_addr, &addr);
1270 			break;
1271 
1272 		case AF_INET6:
1273 			sin6 = (struct sockaddr_in6 *)addrs + cnt;
1274 			addr = sin6->sin6_addr;
1275 			ifindex = sin6->sin6_scope_id;
1276 			break;
1277 		}
1278 		sctp_ipif = sctp_lookup_ipif_addr(&addr, B_FALSE,
1279 		    sctp->sctp_zoneid, !sctp->sctp_connp->conn_allzones,
1280 		    ifindex, 0, B_TRUE, sctp->sctp_sctps);
1281 		ASSERT(sctp_ipif != NULL);
1282 		sctp_ipif_hash_remove(sctp, sctp_ipif);
1283 	}
1284 	if (sctp->sctp_bound_to_all == 1)
1285 		sctp->sctp_bound_to_all = 0;
1286 
1287 	if (!fanout_locked) {
1288 		if (sctp->sctp_conn_tfp != NULL)
1289 			mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
1290 		if (sctp->sctp_listen_tfp != NULL)
1291 			mutex_exit(&sctp->sctp_listen_tfp->tf_lock);
1292 	}
1293 }
1294 
1295 /*
1296  * Given an address get the corresponding entry from the list
1297  * Called with no locks held.
1298  */
1299 sctp_saddr_ipif_t *
1300 sctp_saddr_lookup(sctp_t *sctp, in6_addr_t *addr, uint_t ifindex)
1301 {
1302 	int			cnt;
1303 	sctp_saddr_ipif_t	*ipif_obj;
1304 	int			hindex;
1305 	sctp_ipif_t		*sctp_ipif;
1306 
1307 	hindex = SCTP_IPIF_ADDR_HASH(*addr, !IN6_IS_ADDR_V4MAPPED(addr));
1308 	if (sctp->sctp_saddrs[hindex].ipif_count == 0)
1309 		return (NULL);
1310 
1311 	ipif_obj = list_head(&sctp->sctp_saddrs[hindex].sctp_ipif_list);
1312 	for (cnt = 0; cnt < sctp->sctp_saddrs[hindex].ipif_count; cnt++) {
1313 		sctp_ipif = ipif_obj->saddr_ipifp;
1314 		/*
1315 		 * Zone check shouldn't be needed.
1316 		 */
1317 		if (IN6_ARE_ADDR_EQUAL(addr, &sctp_ipif->sctp_ipif_saddr) &&
1318 		    (ifindex == 0 ||
1319 		    ifindex == sctp_ipif->sctp_ipif_ill->sctp_ill_index) &&
1320 		    SCTP_IPIF_USABLE(sctp_ipif->sctp_ipif_state)) {
1321 			return (ipif_obj);
1322 		}
1323 		ipif_obj = list_next(&sctp->sctp_saddrs[hindex].sctp_ipif_list,
1324 		    ipif_obj);
1325 	}
1326 	return (NULL);
1327 }
1328 
1329 /* Given an address, add it to the source address list */
1330 int
1331 sctp_saddr_add_addr(sctp_t *sctp, in6_addr_t *addr, uint_t ifindex)
1332 {
1333 	sctp_ipif_t		*sctp_ipif;
1334 
1335 	sctp_ipif = sctp_lookup_ipif_addr(addr, B_TRUE, sctp->sctp_zoneid,
1336 	    !sctp->sctp_connp->conn_allzones, ifindex, 0, B_TRUE,
1337 	    sctp->sctp_sctps);
1338 	if (sctp_ipif == NULL)
1339 		return (EINVAL);
1340 
1341 	if (sctp_ipif_hash_insert(sctp, sctp_ipif, KM_NOSLEEP, B_FALSE,
1342 	    B_FALSE) != 0) {
1343 		SCTP_IPIF_REFRELE(sctp_ipif);
1344 		return (EINVAL);
1345 	}
1346 	return (0);
1347 }
1348 
1349 /*
1350  * Remove or mark as dontsrc addresses that are currently not part of the
1351  * association. One would delete addresses when processing an INIT and
1352  * mark as dontsrc when processing an INIT-ACK.
1353  */
1354 void
1355 sctp_check_saddr(sctp_t *sctp, int supp_af, boolean_t delete)
1356 {
1357 	int			i;
1358 	int			l;
1359 	sctp_saddr_ipif_t	*obj;
1360 	int			scanned = 0;
1361 	int			naddr;
1362 	int			nsaddr;
1363 
1364 	ASSERT(!sctp->sctp_loopback && !sctp->sctp_linklocal && supp_af != 0);
1365 
1366 	/*
1367 	 * Irregardless of the supported address in the INIT, v4
1368 	 * must be supported.
1369 	 */
1370 	if (sctp->sctp_family == AF_INET)
1371 		supp_af = PARM_SUPP_V4;
1372 
1373 	nsaddr = sctp->sctp_nsaddrs;
1374 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1375 		if (sctp->sctp_saddrs[i].ipif_count == 0)
1376 			continue;
1377 		obj = list_head(&sctp->sctp_saddrs[i].sctp_ipif_list);
1378 		naddr = sctp->sctp_saddrs[i].ipif_count;
1379 		for (l = 0; l < naddr; l++) {
1380 			sctp_ipif_t	*ipif;
1381 
1382 			ipif = obj->saddr_ipifp;
1383 			scanned++;
1384 
1385 			/*
1386 			 * Delete/mark dontsrc loopback/linklocal addresses and
1387 			 * unsupported address.
1388 			 * On a clustered node, we trust the clustering module
1389 			 * to do the right thing w.r.t loopback addresses, so
1390 			 * we ignore loopback addresses in this check.
1391 			 */
1392 			if ((SCTP_IS_IPIF_LOOPBACK(ipif) &&
1393 			    cl_sctp_check_addrs == NULL) ||
1394 			    SCTP_IS_IPIF_LINKLOCAL(ipif) ||
1395 			    SCTP_UNSUPP_AF(ipif, supp_af)) {
1396 				if (!delete) {
1397 					obj->saddr_ipif_unconfirmed = 1;
1398 					goto next_obj;
1399 				}
1400 				if (sctp->sctp_bound_to_all == 1)
1401 					sctp->sctp_bound_to_all = 0;
1402 				if (scanned < nsaddr) {
1403 					obj = list_next(&sctp->sctp_saddrs[i].
1404 					    sctp_ipif_list, obj);
1405 					sctp_ipif_hash_remove(sctp, ipif);
1406 					continue;
1407 				}
1408 				sctp_ipif_hash_remove(sctp, ipif);
1409 			}
1410 	next_obj:
1411 			if (scanned >= nsaddr)
1412 				return;
1413 			obj = list_next(&sctp->sctp_saddrs[i].sctp_ipif_list,
1414 			    obj);
1415 		}
1416 	}
1417 }
1418 
1419 
1420 /* Get the first valid address from the list. Called with no locks held */
1421 in6_addr_t
1422 sctp_get_valid_addr(sctp_t *sctp, boolean_t isv6)
1423 {
1424 	int			i;
1425 	int			l;
1426 	sctp_saddr_ipif_t	*obj;
1427 	int			scanned = 0;
1428 	in6_addr_t		addr;
1429 
1430 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1431 		if (sctp->sctp_saddrs[i].ipif_count == 0)
1432 			continue;
1433 		obj = list_head(&sctp->sctp_saddrs[i].sctp_ipif_list);
1434 		for (l = 0; l < sctp->sctp_saddrs[i].ipif_count; l++) {
1435 			sctp_ipif_t	*ipif;
1436 
1437 			ipif = obj->saddr_ipifp;
1438 			if (!SCTP_DONT_SRC(obj) &&
1439 			    ipif->sctp_ipif_isv6 == isv6 &&
1440 			    ipif->sctp_ipif_state == SCTP_IPIFS_UP) {
1441 				return (ipif->sctp_ipif_saddr);
1442 			}
1443 			scanned++;
1444 			if (scanned >= sctp->sctp_nsaddrs)
1445 				goto got_none;
1446 			obj = list_next(&sctp->sctp_saddrs[i].sctp_ipif_list,
1447 			    obj);
1448 		}
1449 	}
1450 got_none:
1451 	/* Need to double check this */
1452 	if (isv6 == B_TRUE)
1453 		addr =  ipv6_all_zeros;
1454 	else
1455 		IN6_IPADDR_TO_V4MAPPED(0, &addr);
1456 
1457 	return (addr);
1458 }
1459 
1460 /*
1461  * Return the list of local addresses of an association.  The parameter
1462  * myaddrs is supposed to be either (struct sockaddr_in *) or (struct
1463  * sockaddr_in6 *) depending on the address family.
1464  */
1465 int
1466 sctp_getmyaddrs(void *conn, void *myaddrs, int *addrcnt)
1467 {
1468 	int			i;
1469 	int			l;
1470 	sctp_saddr_ipif_t	*obj;
1471 	sctp_t			*sctp = (sctp_t *)conn;
1472 	int			family = sctp->sctp_family;
1473 	int			max = *addrcnt;
1474 	size_t			added = 0;
1475 	struct sockaddr_in6	*sin6;
1476 	struct sockaddr_in	*sin4;
1477 	int			scanned = 0;
1478 	boolean_t		skip_lback = B_FALSE;
1479 
1480 	if (sctp->sctp_nsaddrs == 0)
1481 		return (EINVAL);
1482 
1483 	/*
1484 	 * Skip loopback addresses for non-loopback assoc., ignore
1485 	 * this on a clustered node.
1486 	 */
1487 	if (sctp->sctp_state >= SCTPS_ESTABLISHED && !sctp->sctp_loopback &&
1488 	    (cl_sctp_check_addrs == NULL)) {
1489 		skip_lback = B_TRUE;
1490 	}
1491 
1492 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1493 		if (sctp->sctp_saddrs[i].ipif_count == 0)
1494 			continue;
1495 		obj = list_head(&sctp->sctp_saddrs[i].sctp_ipif_list);
1496 		for (l = 0; l < sctp->sctp_saddrs[i].ipif_count; l++) {
1497 			sctp_ipif_t	*ipif = obj->saddr_ipifp;
1498 			in6_addr_t	addr = ipif->sctp_ipif_saddr;
1499 
1500 			scanned++;
1501 			if ((ipif->sctp_ipif_state == SCTP_IPIFS_CONDEMNED) ||
1502 			    SCTP_DONT_SRC(obj) ||
1503 			    (SCTP_IS_IPIF_LOOPBACK(ipif) && skip_lback)) {
1504 				if (scanned >= sctp->sctp_nsaddrs)
1505 					goto done;
1506 				obj = list_next(&sctp->sctp_saddrs[i].
1507 				    sctp_ipif_list, obj);
1508 				continue;
1509 			}
1510 			switch (family) {
1511 			case AF_INET:
1512 				sin4 = (struct sockaddr_in *)myaddrs + added;
1513 				sin4->sin_family = AF_INET;
1514 				sin4->sin_port = sctp->sctp_lport;
1515 				IN6_V4MAPPED_TO_INADDR(&addr, &sin4->sin_addr);
1516 				break;
1517 
1518 			case AF_INET6:
1519 				sin6 = (struct sockaddr_in6 *)myaddrs + added;
1520 				sin6->sin6_family = AF_INET6;
1521 				sin6->sin6_port = sctp->sctp_lport;
1522 				sin6->sin6_addr = addr;
1523 				break;
1524 			}
1525 			added++;
1526 			if (added >= max || scanned >= sctp->sctp_nsaddrs)
1527 				goto done;
1528 			obj = list_next(&sctp->sctp_saddrs[i].sctp_ipif_list,
1529 			    obj);
1530 		}
1531 	}
1532 done:
1533 	*addrcnt = added;
1534 	return (0);
1535 }
1536 
1537 /*
1538  * Given the supported address family, walk through the source address list
1539  * and return the total length of the available addresses. If 'p' is not
1540  * null, construct the parameter list for the addresses in 'p'.
1541  * 'modify' will only be set when we want the source address list to
1542  * be modified. The source address list will be modified only when
1543  * generating an INIT chunk. For generating an INIT-ACK 'modify' will
1544  * be false since the 'sctp' will be that of the listener.
1545  */
1546 size_t
1547 sctp_saddr_info(sctp_t *sctp, int supp_af, uchar_t *p, boolean_t modify)
1548 {
1549 	int			i;
1550 	int			l;
1551 	sctp_saddr_ipif_t	*obj;
1552 	size_t			paramlen = 0;
1553 	sctp_parm_hdr_t		*hdr;
1554 	int			scanned = 0;
1555 	int			naddr;
1556 	int			nsaddr;
1557 	boolean_t		del_ll = B_FALSE;
1558 	boolean_t		del_lb = B_FALSE;
1559 
1560 
1561 	/*
1562 	 * On a clustered node don't bother changing anything
1563 	 * on the loopback interface.
1564 	 */
1565 	if (modify && !sctp->sctp_loopback && (cl_sctp_check_addrs == NULL))
1566 		del_lb = B_TRUE;
1567 
1568 	if (modify && !sctp->sctp_linklocal)
1569 		del_ll = B_TRUE;
1570 
1571 	nsaddr = sctp->sctp_nsaddrs;
1572 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1573 		if (sctp->sctp_saddrs[i].ipif_count == 0)
1574 			continue;
1575 		obj = list_head(&sctp->sctp_saddrs[i].sctp_ipif_list);
1576 		naddr = sctp->sctp_saddrs[i].ipif_count;
1577 		for (l = 0; l < naddr; l++) {
1578 			in6_addr_t	addr;
1579 			sctp_ipif_t	*ipif;
1580 			boolean_t	ipif_lb;
1581 			boolean_t	ipif_ll;
1582 			boolean_t	unsupp_af;
1583 
1584 			ipif = obj->saddr_ipifp;
1585 			scanned++;
1586 
1587 			ipif_lb = SCTP_IS_IPIF_LOOPBACK(ipif);
1588 			ipif_ll = SCTP_IS_IPIF_LINKLOCAL(ipif);
1589 			unsupp_af = SCTP_UNSUPP_AF(ipif, supp_af);
1590 			/*
1591 			 * We need to either delete or skip loopback/linklocal
1592 			 * or unsupported addresses, if required.
1593 			 */
1594 			if ((ipif_ll && del_ll) || (ipif_lb && del_lb) ||
1595 			    (unsupp_af && modify)) {
1596 				if (sctp->sctp_bound_to_all == 1)
1597 					sctp->sctp_bound_to_all = 0;
1598 				if (scanned < nsaddr) {
1599 					obj = list_next(&sctp->sctp_saddrs[i].
1600 					    sctp_ipif_list, obj);
1601 					sctp_ipif_hash_remove(sctp, ipif);
1602 					continue;
1603 				}
1604 				sctp_ipif_hash_remove(sctp, ipif);
1605 				goto next_addr;
1606 			} else if (ipif_ll || unsupp_af ||
1607 			    (ipif_lb && (cl_sctp_check_addrs == NULL))) {
1608 				goto next_addr;
1609 			}
1610 
1611 			if (!SCTP_IPIF_USABLE(ipif->sctp_ipif_state))
1612 				goto next_addr;
1613 			if (p != NULL)
1614 				hdr = (sctp_parm_hdr_t *)(p + paramlen);
1615 			addr = ipif->sctp_ipif_saddr;
1616 			if (!ipif->sctp_ipif_isv6) {
1617 				struct in_addr	*v4;
1618 
1619 				if (p != NULL) {
1620 					hdr->sph_type = htons(PARM_ADDR4);
1621 					hdr->sph_len = htons(PARM_ADDR4_LEN);
1622 					v4 = (struct in_addr *)(hdr + 1);
1623 					IN6_V4MAPPED_TO_INADDR(&addr, v4);
1624 				}
1625 				paramlen += PARM_ADDR4_LEN;
1626 			} else {
1627 				if (p != NULL) {
1628 					hdr->sph_type = htons(PARM_ADDR6);
1629 					hdr->sph_len = htons(PARM_ADDR6_LEN);
1630 					bcopy(&addr, hdr + 1, sizeof (addr));
1631 				}
1632 				paramlen += PARM_ADDR6_LEN;
1633 			}
1634 next_addr:
1635 			if (scanned >= nsaddr)
1636 				return (paramlen);
1637 			obj = list_next(&sctp->sctp_saddrs[i].sctp_ipif_list,
1638 			    obj);
1639 		}
1640 	}
1641 	return (paramlen);
1642 }
1643 
1644 /*
1645  * This is used on a clustered node to obtain a list of addresses, the list
1646  * consists of sockaddr_in structs for v4 and sockaddr_in6 for v6. The list
1647  * is then passed onto the clustering module which sends back the correct
1648  * list based on the port info. Regardless of the input, i.e INADDR_ANY
1649  * or specific address(es), we create the list since it could be modified by
1650  * the clustering module. When given a list of addresses, we simply
1651  * create the list of sockaddr_in or sockaddr_in6 structs using those
1652  * addresses. If there is an INADDR_ANY in the input list, or if the
1653  * input is INADDR_ANY, we create a list of sockaddr_in or sockaddr_in6
1654  * structs consisting all the addresses in the global interface list
1655  * except those that are hosted on the loopback interface. We create
1656  * a list of sockaddr_in[6] structs just so that it can be directly input
1657  * to sctp_valid_addr_list() once the clustering module has processed it.
1658  */
1659 int
1660 sctp_get_addrlist(sctp_t *sctp, const void *addrs, uint32_t *addrcnt,
1661     uchar_t **addrlist, int *uspec, size_t *size)
1662 {
1663 	int			cnt;
1664 	int			icnt;
1665 	sctp_ipif_t		*sctp_ipif;
1666 	struct sockaddr_in	*s4;
1667 	struct sockaddr_in6	*s6;
1668 	uchar_t			*p;
1669 	int			err = 0;
1670 	sctp_stack_t		*sctps = sctp->sctp_sctps;
1671 
1672 	*addrlist = NULL;
1673 	*size = 0;
1674 
1675 	/*
1676 	 * Create a list of sockaddr_in[6] structs using the input list.
1677 	 */
1678 	if (sctp->sctp_family == AF_INET) {
1679 		*size = sizeof (struct sockaddr_in) * *addrcnt;
1680 		*addrlist = kmem_zalloc(*size,  KM_SLEEP);
1681 		p = *addrlist;
1682 		for (cnt = 0; cnt < *addrcnt; cnt++) {
1683 			s4 = (struct sockaddr_in *)addrs + cnt;
1684 			/*
1685 			 * We need to create a list of all the available
1686 			 * addresses if there is an INADDR_ANY. However,
1687 			 * if we are beyond LISTEN, then this is invalid
1688 			 * (see sctp_valid_addr_list(). So, we just fail
1689 			 * it here rather than wait till it fails in
1690 			 * sctp_valid_addr_list().
1691 			 */
1692 			if (s4->sin_addr.s_addr == INADDR_ANY) {
1693 				kmem_free(*addrlist, *size);
1694 				*addrlist = NULL;
1695 				*size = 0;
1696 				if (sctp->sctp_state > SCTPS_LISTEN) {
1697 					*addrcnt = 0;
1698 					return (EINVAL);
1699 				}
1700 				if (uspec != NULL)
1701 					*uspec = 1;
1702 				goto get_all_addrs;
1703 			} else {
1704 				bcopy(s4, p, sizeof (*s4));
1705 				p += sizeof (*s4);
1706 			}
1707 		}
1708 	} else {
1709 		*size = sizeof (struct sockaddr_in6) * *addrcnt;
1710 		*addrlist = kmem_zalloc(*size, KM_SLEEP);
1711 		p = *addrlist;
1712 		for (cnt = 0; cnt < *addrcnt; cnt++) {
1713 			s6 = (struct sockaddr_in6 *)addrs + cnt;
1714 			/*
1715 			 * Comments for INADDR_ANY, above, apply here too.
1716 			 */
1717 			if (IN6_IS_ADDR_UNSPECIFIED(&s6->sin6_addr)) {
1718 				kmem_free(*addrlist, *size);
1719 				*size = 0;
1720 				*addrlist = NULL;
1721 				if (sctp->sctp_state > SCTPS_LISTEN) {
1722 					*addrcnt = 0;
1723 					return (EINVAL);
1724 				}
1725 				if (uspec != NULL)
1726 					*uspec = 1;
1727 				goto get_all_addrs;
1728 			} else {
1729 				bcopy(addrs, p, sizeof (*s6));
1730 				p += sizeof (*s6);
1731 			}
1732 		}
1733 	}
1734 	return (err);
1735 get_all_addrs:
1736 
1737 	/*
1738 	 * Allocate max possible size. We allocate the max. size here because
1739 	 * the clustering module could end up adding addresses to the list.
1740 	 * We allocate upfront so that the clustering module need to bother
1741 	 * re-sizing the list.
1742 	 */
1743 	if (sctp->sctp_family == AF_INET) {
1744 		*size = sizeof (struct sockaddr_in) *
1745 		    sctps->sctps_g_ipifs_count;
1746 	} else {
1747 		*size = sizeof (struct sockaddr_in6) *
1748 		    sctps->sctps_g_ipifs_count;
1749 	}
1750 	*addrlist = kmem_zalloc(*size, KM_SLEEP);
1751 	*addrcnt = 0;
1752 	p = *addrlist;
1753 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_READER);
1754 
1755 	/*
1756 	 * Walk through the global interface list and add all addresses,
1757 	 * except those that are hosted on loopback interfaces.
1758 	 */
1759 	for (cnt = 0; cnt <  SCTP_IPIF_HASH; cnt++) {
1760 		if (sctps->sctps_g_ipifs[cnt].ipif_count == 0)
1761 			continue;
1762 		sctp_ipif = list_head(
1763 		    &sctps->sctps_g_ipifs[cnt].sctp_ipif_list);
1764 		for (icnt = 0;
1765 		    icnt < sctps->sctps_g_ipifs[cnt].ipif_count;
1766 		    icnt++) {
1767 			in6_addr_t	addr;
1768 
1769 			rw_enter(&sctp_ipif->sctp_ipif_lock, RW_READER);
1770 			addr = sctp_ipif->sctp_ipif_saddr;
1771 			if (SCTP_IPIF_DISCARD(sctp_ipif->sctp_ipif_flags) ||
1772 			    !SCTP_IPIF_USABLE(sctp_ipif->sctp_ipif_state) ||
1773 			    SCTP_IS_IPIF_LOOPBACK(sctp_ipif) ||
1774 			    SCTP_IS_IPIF_LINKLOCAL(sctp_ipif) ||
1775 			    !SCTP_IPIF_ZONE_MATCH(sctp, sctp_ipif) ||
1776 			    (sctp->sctp_ipversion == IPV4_VERSION &&
1777 			    sctp_ipif->sctp_ipif_isv6) ||
1778 			    (sctp->sctp_connp->conn_ipv6_v6only &&
1779 			    !sctp_ipif->sctp_ipif_isv6)) {
1780 				rw_exit(&sctp_ipif->sctp_ipif_lock);
1781 				sctp_ipif = list_next(
1782 				    &sctps->sctps_g_ipifs[cnt].sctp_ipif_list,
1783 				    sctp_ipif);
1784 				continue;
1785 			}
1786 			rw_exit(&sctp_ipif->sctp_ipif_lock);
1787 			if (sctp->sctp_family == AF_INET) {
1788 				s4 = (struct sockaddr_in *)p;
1789 				IN6_V4MAPPED_TO_INADDR(&addr, &s4->sin_addr);
1790 				s4->sin_family = AF_INET;
1791 				p += sizeof (*s4);
1792 			} else {
1793 				s6 = (struct sockaddr_in6 *)p;
1794 				s6->sin6_addr = addr;
1795 				s6->sin6_family = AF_INET6;
1796 				s6->sin6_scope_id =
1797 				    sctp_ipif->sctp_ipif_ill->sctp_ill_index;
1798 				p += sizeof (*s6);
1799 			}
1800 			(*addrcnt)++;
1801 			sctp_ipif = list_next(
1802 			    &sctps->sctps_g_ipifs[cnt].sctp_ipif_list,
1803 			    sctp_ipif);
1804 		}
1805 	}
1806 	rw_exit(&sctps->sctps_g_ipifs_lock);
1807 	return (err);
1808 }
1809 
1810 /*
1811  * Get a list of addresses from the source address list. The  caller is
1812  * responsible for allocating sufficient buffer for this.
1813  */
1814 void
1815 sctp_get_saddr_list(sctp_t *sctp, uchar_t *p, size_t psize)
1816 {
1817 	int			cnt;
1818 	int			icnt;
1819 	sctp_saddr_ipif_t	*obj;
1820 	int			naddr;
1821 	int			scanned = 0;
1822 
1823 	for (cnt = 0; cnt < SCTP_IPIF_HASH; cnt++) {
1824 		if (sctp->sctp_saddrs[cnt].ipif_count == 0)
1825 			continue;
1826 		obj = list_head(&sctp->sctp_saddrs[cnt].sctp_ipif_list);
1827 		naddr = sctp->sctp_saddrs[cnt].ipif_count;
1828 		for (icnt = 0; icnt < naddr; icnt++) {
1829 			sctp_ipif_t	*ipif;
1830 
1831 			if (psize < sizeof (ipif->sctp_ipif_saddr))
1832 				return;
1833 
1834 			scanned++;
1835 			ipif = obj->saddr_ipifp;
1836 			bcopy(&ipif->sctp_ipif_saddr, p,
1837 			    sizeof (ipif->sctp_ipif_saddr));
1838 			p += sizeof (ipif->sctp_ipif_saddr);
1839 			psize -= sizeof (ipif->sctp_ipif_saddr);
1840 			if (scanned >= sctp->sctp_nsaddrs)
1841 				return;
1842 			obj = list_next(
1843 			    &sctp->sctp_saddrs[icnt].sctp_ipif_list,
1844 			    obj);
1845 		}
1846 	}
1847 }
1848 
1849 /*
1850  * Get a list of addresses from the remote address list. The  caller is
1851  * responsible for allocating sufficient buffer for this.
1852  */
1853 void
1854 sctp_get_faddr_list(sctp_t *sctp, uchar_t *p, size_t psize)
1855 {
1856 	sctp_faddr_t	*fp;
1857 
1858 	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) {
1859 		if (psize < sizeof (fp->faddr))
1860 			return;
1861 		bcopy(&fp->faddr, p, sizeof (fp->faddr));
1862 		p += sizeof (fp->faddr);
1863 		psize -= sizeof (fp->faddr);
1864 	}
1865 }
1866 
1867 static void
1868 sctp_free_ills(sctp_stack_t *sctps)
1869 {
1870 	int			i;
1871 	int			l;
1872 	sctp_ill_t	*sctp_ill;
1873 
1874 	if (sctps->sctps_ills_count == 0)
1875 		return;
1876 
1877 	for (i = 0; i < SCTP_ILL_HASH; i++) {
1878 		sctp_ill = list_tail(&sctps->sctps_g_ills[i].sctp_ill_list);
1879 		for (l = 0; l < sctps->sctps_g_ills[i].ill_count; l++) {
1880 			ASSERT(sctp_ill->sctp_ill_ipifcnt == 0);
1881 			list_remove(&sctps->sctps_g_ills[i].sctp_ill_list,
1882 			    sctp_ill);
1883 			sctps->sctps_ills_count--;
1884 			kmem_free(sctp_ill->sctp_ill_name,
1885 			    sctp_ill->sctp_ill_name_length);
1886 			kmem_free(sctp_ill, sizeof (sctp_ill_t));
1887 			sctp_ill =
1888 			    list_tail(&sctps->sctps_g_ills[i].sctp_ill_list);
1889 		}
1890 		sctps->sctps_g_ills[i].ill_count = 0;
1891 	}
1892 	ASSERT(sctps->sctps_ills_count == 0);
1893 }
1894 
1895 static void
1896 sctp_free_ipifs(sctp_stack_t *sctps)
1897 {
1898 	int			i;
1899 	int			l;
1900 	sctp_ipif_t	*sctp_ipif;
1901 	sctp_ill_t	*sctp_ill;
1902 
1903 	if (sctps->sctps_g_ipifs_count == 0)
1904 		return;
1905 
1906 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1907 		sctp_ipif = list_tail(&sctps->sctps_g_ipifs[i].sctp_ipif_list);
1908 		for (l = 0; l < sctps->sctps_g_ipifs[i].ipif_count; l++) {
1909 			sctp_ill = sctp_ipif->sctp_ipif_ill;
1910 
1911 			list_remove(&sctps->sctps_g_ipifs[i].sctp_ipif_list,
1912 			    sctp_ipif);
1913 			sctps->sctps_g_ipifs_count--;
1914 			(void) atomic_add_32_nv(&sctp_ill->sctp_ill_ipifcnt,
1915 			    -1);
1916 			kmem_free(sctp_ipif, sizeof (sctp_ipif_t));
1917 			sctp_ipif =
1918 			    list_tail(&sctps->sctps_g_ipifs[i].sctp_ipif_list);
1919 		}
1920 		sctps->sctps_g_ipifs[i].ipif_count = 0;
1921 	}
1922 	ASSERT(sctps->sctps_g_ipifs_count == 0);
1923 }
1924 
1925 
1926 /* Initialize the SCTP ILL list and lock */
1927 void
1928 sctp_saddr_init(sctp_stack_t *sctps)
1929 {
1930 	int	i;
1931 
1932 	sctps->sctps_g_ills = kmem_zalloc(sizeof (sctp_ill_hash_t) *
1933 	    SCTP_ILL_HASH, KM_SLEEP);
1934 	sctps->sctps_g_ipifs = kmem_zalloc(sizeof (sctp_ipif_hash_t) *
1935 	    SCTP_IPIF_HASH, KM_SLEEP);
1936 
1937 	rw_init(&sctps->sctps_g_ills_lock, NULL, RW_DEFAULT, NULL);
1938 	rw_init(&sctps->sctps_g_ipifs_lock, NULL, RW_DEFAULT, NULL);
1939 
1940 	for (i = 0; i < SCTP_ILL_HASH; i++) {
1941 		sctps->sctps_g_ills[i].ill_count = 0;
1942 		list_create(&sctps->sctps_g_ills[i].sctp_ill_list,
1943 		    sizeof (sctp_ill_t),
1944 		    offsetof(sctp_ill_t, sctp_ills));
1945 	}
1946 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1947 		sctps->sctps_g_ipifs[i].ipif_count = 0;
1948 		list_create(&sctps->sctps_g_ipifs[i].sctp_ipif_list,
1949 		    sizeof (sctp_ipif_t), offsetof(sctp_ipif_t, sctp_ipifs));
1950 	}
1951 }
1952 
1953 void
1954 sctp_saddr_fini(sctp_stack_t *sctps)
1955 {
1956 	int	i;
1957 
1958 	sctp_free_ipifs(sctps);
1959 	sctp_free_ills(sctps);
1960 
1961 	for (i = 0; i < SCTP_ILL_HASH; i++)
1962 		list_destroy(&sctps->sctps_g_ills[i].sctp_ill_list);
1963 	for (i = 0; i < SCTP_IPIF_HASH; i++)
1964 		list_destroy(&sctps->sctps_g_ipifs[i].sctp_ipif_list);
1965 
1966 	ASSERT(sctps->sctps_ills_count == 0 && sctps->sctps_g_ipifs_count == 0);
1967 	kmem_free(sctps->sctps_g_ills, sizeof (sctp_ill_hash_t) *
1968 	    SCTP_ILL_HASH);
1969 	sctps->sctps_g_ills = NULL;
1970 	kmem_free(sctps->sctps_g_ipifs, sizeof (sctp_ipif_hash_t) *
1971 	    SCTP_IPIF_HASH);
1972 	sctps->sctps_g_ipifs = NULL;
1973 	rw_destroy(&sctps->sctps_g_ills_lock);
1974 	rw_destroy(&sctps->sctps_g_ipifs_lock);
1975 }
1976