1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 #pragma ident "%Z%%M% %I% %E% SMI" 28 29 #include <sys/types.h> 30 #include <sys/systm.h> 31 #include <sys/stream.h> 32 #include <sys/strsubr.h> 33 #include <sys/ddi.h> 34 #include <sys/sunddi.h> 35 #include <sys/kmem.h> 36 #include <sys/socket.h> 37 #include <sys/random.h> 38 #include <sys/tsol/tndb.h> 39 #include <sys/tsol/tnet.h> 40 41 #include <netinet/in.h> 42 #include <netinet/ip6.h> 43 #include <netinet/sctp.h> 44 45 #include <inet/common.h> 46 #include <inet/ip.h> 47 #include <inet/ip6.h> 48 #include <inet/ip_ire.h> 49 #include <inet/mib2.h> 50 #include <inet/nd.h> 51 #include <inet/optcom.h> 52 #include <inet/sctp_ip.h> 53 #include <inet/ipclassifier.h> 54 55 #include "sctp_impl.h" 56 #include "sctp_addr.h" 57 #include "sctp_asconf.h" 58 59 static struct kmem_cache *sctp_kmem_faddr_cache; 60 static void sctp_init_faddr(sctp_t *, sctp_faddr_t *, in6_addr_t *, mblk_t *); 61 62 /* Set the source address. Refer to comments in sctp_get_ire(). */ 63 void 64 sctp_set_saddr(sctp_t *sctp, sctp_faddr_t *fp) 65 { 66 boolean_t v6 = !fp->isv4; 67 boolean_t addr_set; 68 69 fp->saddr = sctp_get_valid_addr(sctp, v6, &addr_set); 70 /* 71 * If there is no source address avaialble, mark this peer address 72 * as unreachable for now. When the heartbeat timer fires, it will 73 * call sctp_get_ire() to re-check if there is any source address 74 * available. 75 */ 76 if (!addr_set) 77 fp->state = SCTP_FADDRS_UNREACH; 78 } 79 80 /* 81 * Call this function to update the cached IRE of a peer addr fp. 82 */ 83 void 84 sctp_get_ire(sctp_t *sctp, sctp_faddr_t *fp) 85 { 86 ire_t *ire; 87 ipaddr_t addr4; 88 in6_addr_t laddr; 89 sctp_saddr_ipif_t *sp; 90 int hdrlen; 91 ts_label_t *tsl; 92 sctp_stack_t *sctps = sctp->sctp_sctps; 93 ip_stack_t *ipst = sctps->sctps_netstack->netstack_ip; 94 95 /* Remove the previous cache IRE */ 96 if ((ire = fp->ire) != NULL) { 97 IRE_REFRELE_NOTR(ire); 98 fp->ire = NULL; 99 } 100 101 /* 102 * If this addr is not reachable, mark it as unconfirmed for now, the 103 * state will be changed back to unreachable later in this function 104 * if it is still the case. 105 */ 106 if (fp->state == SCTP_FADDRS_UNREACH) { 107 fp->state = SCTP_FADDRS_UNCONFIRMED; 108 } 109 110 tsl = crgetlabel(CONN_CRED(sctp->sctp_connp)); 111 112 if (fp->isv4) { 113 IN6_V4MAPPED_TO_IPADDR(&fp->faddr, addr4); 114 ire = ire_cache_lookup(addr4, sctp->sctp_zoneid, tsl, ipst); 115 if (ire != NULL) 116 IN6_IPADDR_TO_V4MAPPED(ire->ire_src_addr, &laddr); 117 } else { 118 ire = ire_cache_lookup_v6(&fp->faddr, sctp->sctp_zoneid, tsl, 119 ipst); 120 if (ire != NULL) 121 laddr = ire->ire_src_addr_v6; 122 } 123 124 if (ire == NULL) { 125 dprint(3, ("ire2faddr: no ire for %x:%x:%x:%x\n", 126 SCTP_PRINTADDR(fp->faddr))); 127 /* 128 * It is tempting to just leave the src addr 129 * unspecified and let IP figure it out, but we 130 * *cannot* do this, since IP may choose a src addr 131 * that is not part of this association... unless 132 * this sctp has bound to all addrs. So if the ire 133 * lookup fails, try to find one in our src addr 134 * list, unless the sctp has bound to all addrs, in 135 * which case we change the src addr to unspec. 136 * 137 * Note that if this is a v6 endpoint but it does 138 * not have any v4 address at this point (e.g. may 139 * have been deleted), sctp_get_valid_addr() will 140 * return mapped INADDR_ANY. In this case, this 141 * address should be marked not reachable so that 142 * it won't be used to send data. 143 */ 144 sctp_set_saddr(sctp, fp); 145 if (fp->state == SCTP_FADDRS_UNREACH) 146 return; 147 goto check_current; 148 } 149 150 /* Make sure the laddr is part of this association */ 151 if ((sp = sctp_saddr_lookup(sctp, &ire->ire_ipif->ipif_v6lcl_addr, 152 0)) != NULL && !sp->saddr_ipif_dontsrc) { 153 if (sp->saddr_ipif_unconfirmed == 1) 154 sp->saddr_ipif_unconfirmed = 0; 155 fp->saddr = laddr; 156 } else { 157 dprint(2, ("ire2faddr: src addr is not part of assc\n")); 158 159 /* 160 * Set the src to the first saddr and hope for the best. 161 * Note that we will still do the ire caching below. 162 * Otherwise, whenever we send a packet, we need to do 163 * the ire lookup again and still may not get the correct 164 * source address. Note that this case should very seldomly 165 * happen. One scenario this can happen is an app 166 * explicitly bind() to an address. But that address is 167 * not the preferred source address to send to the peer. 168 */ 169 sctp_set_saddr(sctp, fp); 170 if (fp->state == SCTP_FADDRS_UNREACH) { 171 IRE_REFRELE(ire); 172 return; 173 } 174 } 175 176 /* 177 * Note that ire_cache_lookup_*() returns an ire with the tracing 178 * bits enabled. This requires the thread holding the ire also 179 * do the IRE_REFRELE(). Thus we need to do IRE_REFHOLD_NOTR() 180 * and then IRE_REFRELE() the ire here to make the tracing bits 181 * work. 182 */ 183 IRE_REFHOLD_NOTR(ire); 184 IRE_REFRELE(ire); 185 186 /* Cache the IRE */ 187 fp->ire = ire; 188 if (fp->ire->ire_type == IRE_LOOPBACK && !sctp->sctp_loopback) 189 sctp->sctp_loopback = 1; 190 191 /* 192 * Pull out RTO information for this faddr and use it if we don't 193 * have any yet. 194 */ 195 if (fp->srtt == -1 && ire->ire_uinfo.iulp_rtt != 0) { 196 /* The cached value is in ms. */ 197 fp->srtt = MSEC_TO_TICK(ire->ire_uinfo.iulp_rtt); 198 fp->rttvar = MSEC_TO_TICK(ire->ire_uinfo.iulp_rtt_sd); 199 fp->rto = 3 * fp->srtt; 200 201 /* Bound the RTO by configured min and max values */ 202 if (fp->rto < sctp->sctp_rto_min) { 203 fp->rto = sctp->sctp_rto_min; 204 } 205 if (fp->rto > sctp->sctp_rto_max) { 206 fp->rto = sctp->sctp_rto_max; 207 } 208 } 209 210 /* 211 * Record the MTU for this faddr. If the MTU for this faddr has 212 * changed, check if the assc MTU will also change. 213 */ 214 if (fp->isv4) { 215 hdrlen = sctp->sctp_hdr_len; 216 } else { 217 hdrlen = sctp->sctp_hdr6_len; 218 } 219 if ((fp->sfa_pmss + hdrlen) != ire->ire_max_frag) { 220 /* Make sure that sfa_pmss is a multiple of SCTP_ALIGN. */ 221 fp->sfa_pmss = (ire->ire_max_frag - hdrlen) & ~(SCTP_ALIGN - 1); 222 if (fp->cwnd < (fp->sfa_pmss * 2)) { 223 SET_CWND(fp, fp->sfa_pmss, 224 sctps->sctps_slow_start_initial); 225 } 226 } 227 228 check_current: 229 if (fp == sctp->sctp_current) 230 sctp_set_faddr_current(sctp, fp); 231 } 232 233 void 234 sctp_update_ire(sctp_t *sctp) 235 { 236 ire_t *ire; 237 sctp_faddr_t *fp; 238 sctp_stack_t *sctps = sctp->sctp_sctps; 239 240 for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) { 241 if ((ire = fp->ire) == NULL) 242 continue; 243 mutex_enter(&ire->ire_lock); 244 245 /* 246 * If the cached IRE is going away, there is no point to 247 * update it. 248 */ 249 if (ire->ire_marks & IRE_MARK_CONDEMNED) { 250 mutex_exit(&ire->ire_lock); 251 IRE_REFRELE_NOTR(ire); 252 fp->ire = NULL; 253 continue; 254 } 255 256 /* 257 * Only record the PMTU for this faddr if we actually have 258 * done discovery. This prevents initialized default from 259 * clobbering any real info that IP may have. 260 */ 261 if (fp->pmtu_discovered) { 262 if (fp->isv4) { 263 ire->ire_max_frag = fp->sfa_pmss + 264 sctp->sctp_hdr_len; 265 } else { 266 ire->ire_max_frag = fp->sfa_pmss + 267 sctp->sctp_hdr6_len; 268 } 269 } 270 271 if (sctps->sctps_rtt_updates != 0 && 272 fp->rtt_updates >= sctps->sctps_rtt_updates) { 273 /* 274 * If there is no old cached values, initialize them 275 * conservatively. Set them to be (1.5 * new value). 276 * This code copied from ip_ire_advise(). The cached 277 * value is in ms. 278 */ 279 if (ire->ire_uinfo.iulp_rtt != 0) { 280 ire->ire_uinfo.iulp_rtt = 281 (ire->ire_uinfo.iulp_rtt + 282 TICK_TO_MSEC(fp->srtt)) >> 1; 283 } else { 284 ire->ire_uinfo.iulp_rtt = 285 TICK_TO_MSEC(fp->srtt + (fp->srtt >> 1)); 286 } 287 if (ire->ire_uinfo.iulp_rtt_sd != 0) { 288 ire->ire_uinfo.iulp_rtt_sd = 289 (ire->ire_uinfo.iulp_rtt_sd + 290 TICK_TO_MSEC(fp->rttvar)) >> 1; 291 } else { 292 ire->ire_uinfo.iulp_rtt_sd = 293 TICK_TO_MSEC(fp->rttvar + 294 (fp->rttvar >> 1)); 295 } 296 fp->rtt_updates = 0; 297 } 298 mutex_exit(&ire->ire_lock); 299 } 300 } 301 302 /* 303 * The sender must set the total length in the IP header. 304 * If sendto == NULL, the current will be used. 305 */ 306 mblk_t * 307 sctp_make_mp(sctp_t *sctp, sctp_faddr_t *sendto, int trailer) 308 { 309 mblk_t *mp; 310 size_t ipsctplen; 311 int isv4; 312 sctp_faddr_t *fp; 313 sctp_stack_t *sctps = sctp->sctp_sctps; 314 boolean_t src_changed = B_FALSE; 315 316 ASSERT(sctp->sctp_current != NULL || sendto != NULL); 317 if (sendto == NULL) { 318 fp = sctp->sctp_current; 319 } else { 320 fp = sendto; 321 } 322 isv4 = fp->isv4; 323 324 /* Try to look for another IRE again. */ 325 if (fp->ire == NULL) { 326 sctp_get_ire(sctp, fp); 327 /* 328 * Although we still may not get an IRE, the source address 329 * may be changed in sctp_get_ire(). Set src_changed to 330 * true so that the source address is copied again. 331 */ 332 src_changed = B_TRUE; 333 } 334 335 /* There is no suitable source address to use, return. */ 336 if (fp->state == SCTP_FADDRS_UNREACH) 337 return (NULL); 338 ASSERT(!IN6_IS_ADDR_V4MAPPED_ANY(&fp->saddr)); 339 340 if (isv4) { 341 ipsctplen = sctp->sctp_hdr_len; 342 } else { 343 ipsctplen = sctp->sctp_hdr6_len; 344 } 345 346 mp = allocb_cred(ipsctplen + sctps->sctps_wroff_xtra + trailer, 347 CONN_CRED(sctp->sctp_connp)); 348 if (mp == NULL) { 349 ip1dbg(("sctp_make_mp: error making mp..\n")); 350 return (NULL); 351 } 352 mp->b_rptr += sctps->sctps_wroff_xtra; 353 mp->b_wptr = mp->b_rptr + ipsctplen; 354 355 ASSERT(OK_32PTR(mp->b_wptr)); 356 357 if (isv4) { 358 ipha_t *iph = (ipha_t *)mp->b_rptr; 359 360 bcopy(sctp->sctp_iphc, mp->b_rptr, ipsctplen); 361 if (fp != sctp->sctp_current || src_changed) { 362 /* Fix the source and destination addresses. */ 363 IN6_V4MAPPED_TO_IPADDR(&fp->faddr, iph->ipha_dst); 364 IN6_V4MAPPED_TO_IPADDR(&fp->saddr, iph->ipha_src); 365 } 366 /* set or clear the don't fragment bit */ 367 if (fp->df) { 368 iph->ipha_fragment_offset_and_flags = htons(IPH_DF); 369 } else { 370 iph->ipha_fragment_offset_and_flags = 0; 371 } 372 } else { 373 bcopy(sctp->sctp_iphc6, mp->b_rptr, ipsctplen); 374 if (fp != sctp->sctp_current || src_changed) { 375 /* Fix the source and destination addresses. */ 376 ((ip6_t *)(mp->b_rptr))->ip6_dst = fp->faddr; 377 ((ip6_t *)(mp->b_rptr))->ip6_src = fp->saddr; 378 } 379 } 380 ASSERT(sctp->sctp_connp != NULL); 381 382 /* 383 * IP will not free this IRE if it is condemned. SCTP needs to 384 * free it. 385 */ 386 if ((fp->ire != NULL) && (fp->ire->ire_marks & IRE_MARK_CONDEMNED)) { 387 IRE_REFRELE_NOTR(fp->ire); 388 fp->ire = NULL; 389 } 390 /* Stash the conn and ire ptr info. for IP */ 391 SCTP_STASH_IPINFO(mp, fp->ire); 392 393 return (mp); 394 } 395 396 /* 397 * Notify upper layers about preferred write offset, write size. 398 */ 399 void 400 sctp_set_ulp_prop(sctp_t *sctp) 401 { 402 int hdrlen; 403 sctp_stack_t *sctps = sctp->sctp_sctps; 404 405 if (sctp->sctp_current->isv4) { 406 hdrlen = sctp->sctp_hdr_len; 407 } else { 408 hdrlen = sctp->sctp_hdr6_len; 409 } 410 ASSERT(sctp->sctp_ulpd); 411 412 ASSERT(sctp->sctp_current->sfa_pmss == sctp->sctp_mss); 413 sctp->sctp_ulp_prop(sctp->sctp_ulpd, 414 sctps->sctps_wroff_xtra + hdrlen + sizeof (sctp_data_hdr_t), 415 sctp->sctp_mss - sizeof (sctp_data_hdr_t)); 416 } 417 418 void 419 sctp_set_iplen(sctp_t *sctp, mblk_t *mp) 420 { 421 uint16_t sum = 0; 422 ipha_t *iph; 423 ip6_t *ip6h; 424 mblk_t *pmp = mp; 425 boolean_t isv4; 426 427 isv4 = (IPH_HDR_VERSION(mp->b_rptr) == IPV4_VERSION); 428 for (; pmp; pmp = pmp->b_cont) 429 sum += pmp->b_wptr - pmp->b_rptr; 430 431 if (isv4) { 432 iph = (ipha_t *)mp->b_rptr; 433 iph->ipha_length = htons(sum); 434 } else { 435 ip6h = (ip6_t *)mp->b_rptr; 436 /* 437 * If an ip6i_t is present, the real IPv6 header 438 * immediately follows. 439 */ 440 if (ip6h->ip6_nxt == IPPROTO_RAW) 441 ip6h = (ip6_t *)&ip6h[1]; 442 ip6h->ip6_plen = htons(sum - ((char *)&sctp->sctp_ip6h[1] - 443 sctp->sctp_iphc6)); 444 } 445 } 446 447 int 448 sctp_compare_faddrsets(sctp_faddr_t *a1, sctp_faddr_t *a2) 449 { 450 int na1 = 0; 451 int overlap = 0; 452 int equal = 1; 453 int onematch; 454 sctp_faddr_t *fp1, *fp2; 455 456 for (fp1 = a1; fp1; fp1 = fp1->next) { 457 onematch = 0; 458 for (fp2 = a2; fp2; fp2 = fp2->next) { 459 if (IN6_ARE_ADDR_EQUAL(&fp1->faddr, &fp2->faddr)) { 460 overlap++; 461 onematch = 1; 462 break; 463 } 464 if (!onematch) { 465 equal = 0; 466 } 467 } 468 na1++; 469 } 470 471 if (equal) { 472 return (SCTP_ADDR_EQUAL); 473 } 474 if (overlap == na1) { 475 return (SCTP_ADDR_SUBSET); 476 } 477 if (overlap) { 478 return (SCTP_ADDR_OVERLAP); 479 } 480 return (SCTP_ADDR_DISJOINT); 481 } 482 483 /* 484 * Returns 0 on success, -1 on memory allocation failure. If sleep 485 * is true, this function should never fail. The boolean parameter 486 * first decides whether the newly created faddr structure should be 487 * added at the beginning of the list or at the end. 488 * 489 * Note: caller must hold conn fanout lock. 490 */ 491 int 492 sctp_add_faddr(sctp_t *sctp, in6_addr_t *addr, int sleep, boolean_t first) 493 { 494 sctp_faddr_t *faddr; 495 mblk_t *timer_mp; 496 497 if (is_system_labeled()) { 498 ts_label_t *tsl; 499 tsol_tpc_t *rhtp; 500 int retv; 501 502 tsl = crgetlabel(CONN_CRED(sctp->sctp_connp)); 503 ASSERT(tsl != NULL); 504 505 /* find_tpc automatically does the right thing with IPv4 */ 506 rhtp = find_tpc(addr, IPV6_VERSION, B_FALSE); 507 if (rhtp == NULL) 508 return (EACCES); 509 510 retv = EACCES; 511 if (tsl->tsl_doi == rhtp->tpc_tp.tp_doi) { 512 switch (rhtp->tpc_tp.host_type) { 513 case UNLABELED: 514 /* 515 * Can talk to unlabeled hosts if any of the 516 * following are true: 517 * 1. zone's label matches the remote host's 518 * default label, 519 * 2. mac_exempt is on and the zone dominates 520 * the remote host's label, or 521 * 3. mac_exempt is on and the socket is from 522 * the global zone. 523 */ 524 if (blequal(&rhtp->tpc_tp.tp_def_label, 525 &tsl->tsl_label) || 526 (sctp->sctp_mac_exempt && 527 (sctp->sctp_zoneid == GLOBAL_ZONEID || 528 bldominates(&tsl->tsl_label, 529 &rhtp->tpc_tp.tp_def_label)))) 530 retv = 0; 531 break; 532 case SUN_CIPSO: 533 if (_blinrange(&tsl->tsl_label, 534 &rhtp->tpc_tp.tp_sl_range_cipso) || 535 blinlset(&tsl->tsl_label, 536 rhtp->tpc_tp.tp_sl_set_cipso)) 537 retv = 0; 538 break; 539 } 540 } 541 TPC_RELE(rhtp); 542 if (retv != 0) 543 return (retv); 544 } 545 546 if ((faddr = kmem_cache_alloc(sctp_kmem_faddr_cache, sleep)) == NULL) 547 return (ENOMEM); 548 timer_mp = sctp_timer_alloc((sctp), sctp_rexmit_timer, sleep); 549 if (timer_mp == NULL) { 550 kmem_cache_free(sctp_kmem_faddr_cache, faddr); 551 return (ENOMEM); 552 } 553 ((sctpt_t *)(timer_mp->b_rptr))->sctpt_faddr = faddr; 554 555 sctp_init_faddr(sctp, faddr, addr, timer_mp); 556 557 /* Check for subnet broadcast. */ 558 if (faddr->ire != NULL && faddr->ire->ire_type & IRE_BROADCAST) { 559 IRE_REFRELE_NOTR(faddr->ire); 560 sctp_timer_free(timer_mp); 561 kmem_cache_free(sctp_kmem_faddr_cache, faddr); 562 return (EADDRNOTAVAIL); 563 } 564 ASSERT(faddr->next == NULL); 565 566 if (sctp->sctp_faddrs == NULL) { 567 ASSERT(sctp->sctp_lastfaddr == NULL); 568 /* only element on list; first and last are same */ 569 sctp->sctp_faddrs = sctp->sctp_lastfaddr = faddr; 570 } else if (first) { 571 ASSERT(sctp->sctp_lastfaddr != NULL); 572 faddr->next = sctp->sctp_faddrs; 573 sctp->sctp_faddrs = faddr; 574 } else { 575 sctp->sctp_lastfaddr->next = faddr; 576 sctp->sctp_lastfaddr = faddr; 577 } 578 sctp->sctp_nfaddrs++; 579 580 return (0); 581 } 582 583 sctp_faddr_t * 584 sctp_lookup_faddr(sctp_t *sctp, in6_addr_t *addr) 585 { 586 sctp_faddr_t *fp; 587 588 for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) { 589 if (IN6_ARE_ADDR_EQUAL(&fp->faddr, addr)) 590 break; 591 } 592 593 return (fp); 594 } 595 596 sctp_faddr_t * 597 sctp_lookup_faddr_nosctp(sctp_faddr_t *fp, in6_addr_t *addr) 598 { 599 for (; fp; fp = fp->next) { 600 if (IN6_ARE_ADDR_EQUAL(&fp->faddr, addr)) { 601 break; 602 } 603 } 604 605 return (fp); 606 } 607 608 /* 609 * To change the currently used peer address to the specified one. 610 */ 611 void 612 sctp_set_faddr_current(sctp_t *sctp, sctp_faddr_t *fp) 613 { 614 /* Now setup the composite header. */ 615 if (fp->isv4) { 616 IN6_V4MAPPED_TO_IPADDR(&fp->faddr, 617 sctp->sctp_ipha->ipha_dst); 618 IN6_V4MAPPED_TO_IPADDR(&fp->saddr, sctp->sctp_ipha->ipha_src); 619 /* update don't fragment bit */ 620 if (fp->df) { 621 sctp->sctp_ipha->ipha_fragment_offset_and_flags = 622 htons(IPH_DF); 623 } else { 624 sctp->sctp_ipha->ipha_fragment_offset_and_flags = 0; 625 } 626 } else { 627 sctp->sctp_ip6h->ip6_dst = fp->faddr; 628 sctp->sctp_ip6h->ip6_src = fp->saddr; 629 } 630 631 sctp->sctp_current = fp; 632 sctp->sctp_mss = fp->sfa_pmss; 633 634 /* Update the uppper layer for the change. */ 635 if (!SCTP_IS_DETACHED(sctp)) 636 sctp_set_ulp_prop(sctp); 637 } 638 639 void 640 sctp_redo_faddr_srcs(sctp_t *sctp) 641 { 642 sctp_faddr_t *fp; 643 644 for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) { 645 sctp_get_ire(sctp, fp); 646 } 647 } 648 649 void 650 sctp_faddr_alive(sctp_t *sctp, sctp_faddr_t *fp) 651 { 652 int64_t now = lbolt64; 653 654 fp->strikes = 0; 655 sctp->sctp_strikes = 0; 656 fp->lastactive = now; 657 fp->hb_expiry = now + SET_HB_INTVL(fp); 658 fp->hb_pending = B_FALSE; 659 if (fp->state != SCTP_FADDRS_ALIVE) { 660 fp->state = SCTP_FADDRS_ALIVE; 661 sctp_intf_event(sctp, fp->faddr, SCTP_ADDR_AVAILABLE, 0); 662 /* Should have a full IRE now */ 663 sctp_get_ire(sctp, fp); 664 665 /* 666 * If this is the primary, switch back to it now. And 667 * we probably want to reset the source addr used to reach 668 * it. 669 */ 670 if (fp == sctp->sctp_primary) { 671 ASSERT(fp->state != SCTP_FADDRS_UNREACH); 672 sctp_set_faddr_current(sctp, fp); 673 return; 674 } 675 } 676 } 677 678 int 679 sctp_is_a_faddr_clean(sctp_t *sctp) 680 { 681 sctp_faddr_t *fp; 682 683 for (fp = sctp->sctp_faddrs; fp; fp = fp->next) { 684 if (fp->state == SCTP_FADDRS_ALIVE && fp->strikes == 0) { 685 return (1); 686 } 687 } 688 689 return (0); 690 } 691 692 /* 693 * Returns 0 if there is at leave one other active faddr, -1 if there 694 * are none. If there are none left, faddr_dead() will start killing the 695 * association. 696 * If the downed faddr was the current faddr, a new current faddr 697 * will be chosen. 698 */ 699 int 700 sctp_faddr_dead(sctp_t *sctp, sctp_faddr_t *fp, int newstate) 701 { 702 sctp_faddr_t *ofp; 703 sctp_stack_t *sctps = sctp->sctp_sctps; 704 705 if (fp->state == SCTP_FADDRS_ALIVE) { 706 sctp_intf_event(sctp, fp->faddr, SCTP_ADDR_UNREACHABLE, 0); 707 } 708 fp->state = newstate; 709 710 dprint(1, ("sctp_faddr_dead: %x:%x:%x:%x down (state=%d)\n", 711 SCTP_PRINTADDR(fp->faddr), newstate)); 712 713 if (fp == sctp->sctp_current) { 714 /* Current faddr down; need to switch it */ 715 sctp->sctp_current = NULL; 716 } 717 718 /* Find next alive faddr */ 719 ofp = fp; 720 for (fp = fp->next; fp != NULL; fp = fp->next) { 721 if (fp->state == SCTP_FADDRS_ALIVE) { 722 break; 723 } 724 } 725 726 if (fp == NULL) { 727 /* Continue from beginning of list */ 728 for (fp = sctp->sctp_faddrs; fp != ofp; fp = fp->next) { 729 if (fp->state == SCTP_FADDRS_ALIVE) { 730 break; 731 } 732 } 733 } 734 735 /* 736 * Find a new fp, so if the current faddr is dead, use the new fp 737 * as the current one. 738 */ 739 if (fp != ofp) { 740 if (sctp->sctp_current == NULL) { 741 dprint(1, ("sctp_faddr_dead: failover->%x:%x:%x:%x\n", 742 SCTP_PRINTADDR(fp->faddr))); 743 /* 744 * Note that we don't need to reset the source addr 745 * of the new fp. 746 */ 747 sctp_set_faddr_current(sctp, fp); 748 } 749 return (0); 750 } 751 752 753 /* All faddrs are down; kill the association */ 754 dprint(1, ("sctp_faddr_dead: all faddrs down, killing assoc\n")); 755 BUMP_MIB(&sctps->sctps_mib, sctpAborted); 756 sctp_assoc_event(sctp, sctp->sctp_state < SCTPS_ESTABLISHED ? 757 SCTP_CANT_STR_ASSOC : SCTP_COMM_LOST, 0, NULL); 758 sctp_clean_death(sctp, sctp->sctp_client_errno ? 759 sctp->sctp_client_errno : ETIMEDOUT); 760 761 return (-1); 762 } 763 764 sctp_faddr_t * 765 sctp_rotate_faddr(sctp_t *sctp, sctp_faddr_t *ofp) 766 { 767 sctp_faddr_t *nfp = NULL; 768 769 if (ofp == NULL) { 770 ofp = sctp->sctp_current; 771 } 772 773 /* Find the next live one */ 774 for (nfp = ofp->next; nfp != NULL; nfp = nfp->next) { 775 if (nfp->state == SCTP_FADDRS_ALIVE) { 776 break; 777 } 778 } 779 780 if (nfp == NULL) { 781 /* Continue from beginning of list */ 782 for (nfp = sctp->sctp_faddrs; nfp != ofp; nfp = nfp->next) { 783 if (nfp->state == SCTP_FADDRS_ALIVE) { 784 break; 785 } 786 } 787 } 788 789 /* 790 * nfp could only be NULL if all faddrs are down, and when 791 * this happens, faddr_dead() should have killed the 792 * association. Hence this assertion... 793 */ 794 ASSERT(nfp != NULL); 795 return (nfp); 796 } 797 798 void 799 sctp_unlink_faddr(sctp_t *sctp, sctp_faddr_t *fp) 800 { 801 sctp_faddr_t *fpp; 802 803 if (!sctp->sctp_faddrs) { 804 return; 805 } 806 807 if (fp->timer_mp != NULL) { 808 sctp_timer_free(fp->timer_mp); 809 fp->timer_mp = NULL; 810 fp->timer_running = 0; 811 } 812 if (fp->rc_timer_mp != NULL) { 813 sctp_timer_free(fp->rc_timer_mp); 814 fp->rc_timer_mp = NULL; 815 fp->rc_timer_running = 0; 816 } 817 if (fp->ire != NULL) { 818 IRE_REFRELE_NOTR(fp->ire); 819 fp->ire = NULL; 820 } 821 822 if (fp == sctp->sctp_faddrs) { 823 goto gotit; 824 } 825 826 for (fpp = sctp->sctp_faddrs; fpp->next != fp; fpp = fpp->next) 827 ; 828 829 gotit: 830 ASSERT(sctp->sctp_conn_tfp != NULL); 831 mutex_enter(&sctp->sctp_conn_tfp->tf_lock); 832 if (fp == sctp->sctp_faddrs) { 833 sctp->sctp_faddrs = fp->next; 834 } else { 835 fpp->next = fp->next; 836 } 837 mutex_exit(&sctp->sctp_conn_tfp->tf_lock); 838 /* XXX faddr2ire? */ 839 kmem_cache_free(sctp_kmem_faddr_cache, fp); 840 sctp->sctp_nfaddrs--; 841 } 842 843 void 844 sctp_zap_faddrs(sctp_t *sctp, int caller_holds_lock) 845 { 846 sctp_faddr_t *fp, *fpn; 847 848 if (sctp->sctp_faddrs == NULL) { 849 ASSERT(sctp->sctp_lastfaddr == NULL); 850 return; 851 } 852 853 ASSERT(sctp->sctp_lastfaddr != NULL); 854 sctp->sctp_lastfaddr = NULL; 855 sctp->sctp_current = NULL; 856 sctp->sctp_primary = NULL; 857 858 sctp_free_faddr_timers(sctp); 859 860 if (sctp->sctp_conn_tfp != NULL && !caller_holds_lock) { 861 /* in conn fanout; need to hold lock */ 862 mutex_enter(&sctp->sctp_conn_tfp->tf_lock); 863 } 864 865 for (fp = sctp->sctp_faddrs; fp; fp = fpn) { 866 fpn = fp->next; 867 if (fp->ire != NULL) 868 IRE_REFRELE_NOTR(fp->ire); 869 kmem_cache_free(sctp_kmem_faddr_cache, fp); 870 sctp->sctp_nfaddrs--; 871 } 872 873 sctp->sctp_faddrs = NULL; 874 ASSERT(sctp->sctp_nfaddrs == 0); 875 if (sctp->sctp_conn_tfp != NULL && !caller_holds_lock) { 876 mutex_exit(&sctp->sctp_conn_tfp->tf_lock); 877 } 878 879 } 880 881 void 882 sctp_zap_addrs(sctp_t *sctp) 883 { 884 sctp_zap_faddrs(sctp, 0); 885 sctp_free_saddrs(sctp); 886 } 887 888 /* 889 * Initialize the IPv4 header. Loses any record of any IP options. 890 */ 891 int 892 sctp_header_init_ipv4(sctp_t *sctp, int sleep) 893 { 894 sctp_hdr_t *sctph; 895 sctp_stack_t *sctps = sctp->sctp_sctps; 896 897 /* 898 * This is a simple initialization. If there's 899 * already a template, it should never be too small, 900 * so reuse it. Otherwise, allocate space for the new one. 901 */ 902 if (sctp->sctp_iphc != NULL) { 903 ASSERT(sctp->sctp_iphc_len >= SCTP_MAX_COMBINED_HEADER_LENGTH); 904 bzero(sctp->sctp_iphc, sctp->sctp_iphc_len); 905 } else { 906 sctp->sctp_iphc_len = SCTP_MAX_COMBINED_HEADER_LENGTH; 907 sctp->sctp_iphc = kmem_zalloc(sctp->sctp_iphc_len, sleep); 908 if (sctp->sctp_iphc == NULL) { 909 sctp->sctp_iphc_len = 0; 910 return (ENOMEM); 911 } 912 } 913 914 sctp->sctp_ipha = (ipha_t *)sctp->sctp_iphc; 915 916 sctp->sctp_hdr_len = sizeof (ipha_t) + sizeof (sctp_hdr_t); 917 sctp->sctp_ip_hdr_len = sizeof (ipha_t); 918 sctp->sctp_ipha->ipha_length = htons(sizeof (ipha_t) + 919 sizeof (sctp_hdr_t)); 920 sctp->sctp_ipha->ipha_version_and_hdr_length = 921 (IP_VERSION << 4) | IP_SIMPLE_HDR_LENGTH_IN_WORDS; 922 923 /* 924 * These two fields should be zero, and are already set above. 925 * 926 * sctp->sctp_ipha->ipha_ident, 927 * sctp->sctp_ipha->ipha_fragment_offset_and_flags. 928 */ 929 930 sctp->sctp_ipha->ipha_ttl = sctps->sctps_ipv4_ttl; 931 sctp->sctp_ipha->ipha_protocol = IPPROTO_SCTP; 932 933 sctph = (sctp_hdr_t *)(sctp->sctp_iphc + sizeof (ipha_t)); 934 sctp->sctp_sctph = sctph; 935 936 return (0); 937 } 938 939 /* 940 * Update sctp_sticky_hdrs based on sctp_sticky_ipp. 941 * The headers include ip6i_t (if needed), ip6_t, any sticky extension 942 * headers, and the maximum size sctp header (to avoid reallocation 943 * on the fly for additional sctp options). 944 * Returns failure if can't allocate memory. 945 */ 946 int 947 sctp_build_hdrs(sctp_t *sctp) 948 { 949 char *hdrs; 950 uint_t hdrs_len; 951 ip6i_t *ip6i; 952 char buf[SCTP_MAX_HDR_LENGTH]; 953 ip6_pkt_t *ipp = &sctp->sctp_sticky_ipp; 954 in6_addr_t src; 955 in6_addr_t dst; 956 sctp_stack_t *sctps = sctp->sctp_sctps; 957 958 /* 959 * save the existing sctp header and source/dest IP addresses 960 */ 961 bcopy(sctp->sctp_sctph6, buf, sizeof (sctp_hdr_t)); 962 src = sctp->sctp_ip6h->ip6_src; 963 dst = sctp->sctp_ip6h->ip6_dst; 964 hdrs_len = ip_total_hdrs_len_v6(ipp) + SCTP_MAX_HDR_LENGTH; 965 ASSERT(hdrs_len != 0); 966 if (hdrs_len > sctp->sctp_iphc6_len) { 967 /* Need to reallocate */ 968 hdrs = kmem_zalloc(hdrs_len, KM_NOSLEEP); 969 if (hdrs == NULL) 970 return (ENOMEM); 971 972 if (sctp->sctp_iphc6_len != 0) 973 kmem_free(sctp->sctp_iphc6, sctp->sctp_iphc6_len); 974 sctp->sctp_iphc6 = hdrs; 975 sctp->sctp_iphc6_len = hdrs_len; 976 } 977 ip_build_hdrs_v6((uchar_t *)sctp->sctp_iphc6, 978 hdrs_len - SCTP_MAX_HDR_LENGTH, ipp, IPPROTO_SCTP); 979 980 /* Set header fields not in ipp */ 981 if (ipp->ipp_fields & IPPF_HAS_IP6I) { 982 ip6i = (ip6i_t *)sctp->sctp_iphc6; 983 sctp->sctp_ip6h = (ip6_t *)&ip6i[1]; 984 } else { 985 sctp->sctp_ip6h = (ip6_t *)sctp->sctp_iphc6; 986 } 987 /* 988 * sctp->sctp_ip_hdr_len will include ip6i_t if there is one. 989 */ 990 sctp->sctp_ip_hdr6_len = hdrs_len - SCTP_MAX_HDR_LENGTH; 991 sctp->sctp_sctph6 = (sctp_hdr_t *)(sctp->sctp_iphc6 + 992 sctp->sctp_ip_hdr6_len); 993 sctp->sctp_hdr6_len = sctp->sctp_ip_hdr6_len + sizeof (sctp_hdr_t); 994 995 bcopy(buf, sctp->sctp_sctph6, sizeof (sctp_hdr_t)); 996 997 sctp->sctp_ip6h->ip6_src = src; 998 sctp->sctp_ip6h->ip6_dst = dst; 999 /* 1000 * If the hoplimit was not set by ip_build_hdrs_v6(), we need to 1001 * set it to the default value for SCTP. 1002 */ 1003 if (!(ipp->ipp_fields & IPPF_UNICAST_HOPS)) 1004 sctp->sctp_ip6h->ip6_hops = sctps->sctps_ipv6_hoplimit; 1005 /* 1006 * If we're setting extension headers after a connection 1007 * has been established, and if we have a routing header 1008 * among the extension headers, call ip_massage_options_v6 to 1009 * manipulate the routing header/ip6_dst set the checksum 1010 * difference in the sctp header template. 1011 * (This happens in sctp_connect_ipv6 if the routing header 1012 * is set prior to the connect.) 1013 */ 1014 1015 if ((sctp->sctp_state >= SCTPS_COOKIE_WAIT) && 1016 (sctp->sctp_sticky_ipp.ipp_fields & IPPF_RTHDR)) { 1017 ip6_rthdr_t *rth; 1018 1019 rth = ip_find_rthdr_v6(sctp->sctp_ip6h, 1020 (uint8_t *)sctp->sctp_sctph6); 1021 if (rth != NULL) { 1022 (void) ip_massage_options_v6(sctp->sctp_ip6h, rth, 1023 sctps->sctps_netstack); 1024 } 1025 } 1026 return (0); 1027 } 1028 1029 /* 1030 * Initialize the IPv6 header. Loses any record of any IPv6 extension headers. 1031 */ 1032 int 1033 sctp_header_init_ipv6(sctp_t *sctp, int sleep) 1034 { 1035 sctp_hdr_t *sctph; 1036 sctp_stack_t *sctps = sctp->sctp_sctps; 1037 1038 /* 1039 * This is a simple initialization. If there's 1040 * already a template, it should never be too small, 1041 * so reuse it. Otherwise, allocate space for the new one. 1042 * Ensure that there is enough space to "downgrade" the sctp_t 1043 * to an IPv4 sctp_t. This requires having space for a full load 1044 * of IPv4 options 1045 */ 1046 if (sctp->sctp_iphc6 != NULL) { 1047 ASSERT(sctp->sctp_iphc6_len >= 1048 SCTP_MAX_COMBINED_HEADER_LENGTH); 1049 bzero(sctp->sctp_iphc6, sctp->sctp_iphc6_len); 1050 } else { 1051 sctp->sctp_iphc6_len = SCTP_MAX_COMBINED_HEADER_LENGTH; 1052 sctp->sctp_iphc6 = kmem_zalloc(sctp->sctp_iphc_len, sleep); 1053 if (sctp->sctp_iphc6 == NULL) { 1054 sctp->sctp_iphc6_len = 0; 1055 return (ENOMEM); 1056 } 1057 } 1058 sctp->sctp_hdr6_len = IPV6_HDR_LEN + sizeof (sctp_hdr_t); 1059 sctp->sctp_ip_hdr6_len = IPV6_HDR_LEN; 1060 sctp->sctp_ip6h = (ip6_t *)sctp->sctp_iphc6; 1061 1062 /* Initialize the header template */ 1063 1064 sctp->sctp_ip6h->ip6_vcf = IPV6_DEFAULT_VERS_AND_FLOW; 1065 sctp->sctp_ip6h->ip6_plen = ntohs(sizeof (sctp_hdr_t)); 1066 sctp->sctp_ip6h->ip6_nxt = IPPROTO_SCTP; 1067 sctp->sctp_ip6h->ip6_hops = sctps->sctps_ipv6_hoplimit; 1068 1069 sctph = (sctp_hdr_t *)(sctp->sctp_iphc6 + IPV6_HDR_LEN); 1070 sctp->sctp_sctph6 = sctph; 1071 1072 return (0); 1073 } 1074 1075 static int 1076 sctp_v4_label(sctp_t *sctp) 1077 { 1078 uchar_t optbuf[IP_MAX_OPT_LENGTH]; 1079 const cred_t *cr = CONN_CRED(sctp->sctp_connp); 1080 int added; 1081 1082 if (tsol_compute_label(cr, sctp->sctp_ipha->ipha_dst, optbuf, 1083 sctp->sctp_mac_exempt, 1084 sctp->sctp_sctps->sctps_netstack->netstack_ip) != 0) 1085 return (EACCES); 1086 1087 added = tsol_remove_secopt(sctp->sctp_ipha, sctp->sctp_hdr_len); 1088 if (added == -1) 1089 return (EACCES); 1090 sctp->sctp_hdr_len += added; 1091 sctp->sctp_sctph = (sctp_hdr_t *)((uchar_t *)sctp->sctp_sctph + added); 1092 sctp->sctp_ip_hdr_len += added; 1093 if ((sctp->sctp_v4label_len = optbuf[IPOPT_OLEN]) != 0) { 1094 sctp->sctp_v4label_len = (sctp->sctp_v4label_len + 3) & ~3; 1095 added = tsol_prepend_option(optbuf, sctp->sctp_ipha, 1096 sctp->sctp_hdr_len); 1097 if (added == -1) 1098 return (EACCES); 1099 sctp->sctp_hdr_len += added; 1100 sctp->sctp_sctph = (sctp_hdr_t *)((uchar_t *)sctp->sctp_sctph + 1101 added); 1102 sctp->sctp_ip_hdr_len += added; 1103 } 1104 return (0); 1105 } 1106 1107 static int 1108 sctp_v6_label(sctp_t *sctp) 1109 { 1110 uchar_t optbuf[TSOL_MAX_IPV6_OPTION]; 1111 const cred_t *cr = CONN_CRED(sctp->sctp_connp); 1112 1113 if (tsol_compute_label_v6(cr, &sctp->sctp_ip6h->ip6_dst, optbuf, 1114 sctp->sctp_mac_exempt, 1115 sctp->sctp_sctps->sctps_netstack->netstack_ip) != 0) 1116 return (EACCES); 1117 if (tsol_update_sticky(&sctp->sctp_sticky_ipp, &sctp->sctp_v6label_len, 1118 optbuf) != 0) 1119 return (EACCES); 1120 if (sctp_build_hdrs(sctp) != 0) 1121 return (EACCES); 1122 return (0); 1123 } 1124 1125 /* 1126 * XXX implement more sophisticated logic 1127 */ 1128 int 1129 sctp_set_hdraddrs(sctp_t *sctp) 1130 { 1131 sctp_faddr_t *fp; 1132 int gotv4 = 0; 1133 int gotv6 = 0; 1134 1135 ASSERT(sctp->sctp_faddrs != NULL); 1136 ASSERT(sctp->sctp_nsaddrs > 0); 1137 1138 /* Set up using the primary first */ 1139 if (IN6_IS_ADDR_V4MAPPED(&sctp->sctp_primary->faddr)) { 1140 IN6_V4MAPPED_TO_IPADDR(&sctp->sctp_primary->faddr, 1141 sctp->sctp_ipha->ipha_dst); 1142 /* saddr may be unspec; make_mp() will handle this */ 1143 IN6_V4MAPPED_TO_IPADDR(&sctp->sctp_primary->saddr, 1144 sctp->sctp_ipha->ipha_src); 1145 if (!is_system_labeled() || sctp_v4_label(sctp) == 0) { 1146 gotv4 = 1; 1147 if (sctp->sctp_ipversion == IPV4_VERSION) { 1148 goto copyports; 1149 } 1150 } 1151 } else { 1152 sctp->sctp_ip6h->ip6_dst = sctp->sctp_primary->faddr; 1153 /* saddr may be unspec; make_mp() will handle this */ 1154 sctp->sctp_ip6h->ip6_src = sctp->sctp_primary->saddr; 1155 if (!is_system_labeled() || sctp_v6_label(sctp) == 0) 1156 gotv6 = 1; 1157 } 1158 1159 for (fp = sctp->sctp_faddrs; fp; fp = fp->next) { 1160 if (!gotv4 && IN6_IS_ADDR_V4MAPPED(&fp->faddr)) { 1161 IN6_V4MAPPED_TO_IPADDR(&fp->faddr, 1162 sctp->sctp_ipha->ipha_dst); 1163 /* copy in the faddr_t's saddr */ 1164 IN6_V4MAPPED_TO_IPADDR(&fp->saddr, 1165 sctp->sctp_ipha->ipha_src); 1166 if (!is_system_labeled() || sctp_v4_label(sctp) == 0) { 1167 gotv4 = 1; 1168 if (sctp->sctp_ipversion == IPV4_VERSION || 1169 gotv6) { 1170 break; 1171 } 1172 } 1173 } else if (!gotv6 && !IN6_IS_ADDR_V4MAPPED(&fp->faddr)) { 1174 sctp->sctp_ip6h->ip6_dst = fp->faddr; 1175 /* copy in the faddr_t's saddr */ 1176 sctp->sctp_ip6h->ip6_src = fp->saddr; 1177 if (!is_system_labeled() || sctp_v6_label(sctp) == 0) { 1178 gotv6 = 1; 1179 if (gotv4) 1180 break; 1181 } 1182 } 1183 } 1184 1185 copyports: 1186 if (!gotv4 && !gotv6) 1187 return (EACCES); 1188 1189 /* copy in the ports for good measure */ 1190 sctp->sctp_sctph->sh_sport = sctp->sctp_lport; 1191 sctp->sctp_sctph->sh_dport = sctp->sctp_fport; 1192 1193 sctp->sctp_sctph6->sh_sport = sctp->sctp_lport; 1194 sctp->sctp_sctph6->sh_dport = sctp->sctp_fport; 1195 return (0); 1196 } 1197 1198 void 1199 sctp_add_unrec_parm(sctp_parm_hdr_t *uph, mblk_t **errmp) 1200 { 1201 mblk_t *mp; 1202 sctp_parm_hdr_t *ph; 1203 size_t len; 1204 int pad; 1205 1206 len = sizeof (*ph) + ntohs(uph->sph_len); 1207 if ((pad = len % 4) != 0) { 1208 pad = 4 - pad; 1209 len += pad; 1210 } 1211 mp = allocb(len, BPRI_MED); 1212 if (mp == NULL) { 1213 return; 1214 } 1215 1216 ph = (sctp_parm_hdr_t *)(mp->b_rptr); 1217 ph->sph_type = htons(PARM_UNRECOGNIZED); 1218 ph->sph_len = htons(len - pad); 1219 1220 /* copy in the unrecognized parameter */ 1221 bcopy(uph, ph + 1, ntohs(uph->sph_len)); 1222 1223 mp->b_wptr = mp->b_rptr + len; 1224 if (*errmp != NULL) { 1225 linkb(*errmp, mp); 1226 } else { 1227 *errmp = mp; 1228 } 1229 } 1230 1231 /* 1232 * o Bounds checking 1233 * o Updates remaining 1234 * o Checks alignment 1235 */ 1236 sctp_parm_hdr_t * 1237 sctp_next_parm(sctp_parm_hdr_t *current, ssize_t *remaining) 1238 { 1239 int pad; 1240 uint16_t len; 1241 1242 len = ntohs(current->sph_len); 1243 *remaining -= len; 1244 if (*remaining < sizeof (*current) || len < sizeof (*current)) { 1245 return (NULL); 1246 } 1247 if ((pad = len & (SCTP_ALIGN - 1)) != 0) { 1248 pad = SCTP_ALIGN - pad; 1249 *remaining -= pad; 1250 } 1251 /*LINTED pointer cast may result in improper alignment*/ 1252 current = (sctp_parm_hdr_t *)((char *)current + len + pad); 1253 return (current); 1254 } 1255 1256 /* 1257 * Sets the address parameters given in the INIT chunk into sctp's 1258 * faddrs; if psctp is non-NULL, copies psctp's saddrs. If there are 1259 * no address parameters in the INIT chunk, a single faddr is created 1260 * from the ip hdr at the beginning of pkt. 1261 * If there already are existing addresses hanging from sctp, merge 1262 * them in, if the old info contains addresses which are not present 1263 * in this new info, get rid of them, and clean the pointers if there's 1264 * messages which have this as their target address. 1265 * 1266 * We also re-adjust the source address list here since the list may 1267 * contain more than what is actually part of the association. If 1268 * we get here from sctp_send_cookie_echo(), we are on the active 1269 * side and psctp will be NULL and ich will be the INIT-ACK chunk. 1270 * If we get here from sctp_accept_comm(), ich will be the INIT chunk 1271 * and psctp will the listening endpoint. 1272 * 1273 * INIT processing: When processing the INIT we inherit the src address 1274 * list from the listener. For a loopback or linklocal association, we 1275 * delete the list and just take the address from the IP header (since 1276 * that's how we created the INIT-ACK). Additionally, for loopback we 1277 * ignore the address params in the INIT. For determining which address 1278 * types were sent in the INIT-ACK we follow the same logic as in 1279 * creating the INIT-ACK. We delete addresses of the type that are not 1280 * supported by the peer. 1281 * 1282 * INIT-ACK processing: When processing the INIT-ACK since we had not 1283 * included addr params for loopback or linklocal addresses when creating 1284 * the INIT, we just use the address from the IP header. Further, for 1285 * loopback we ignore the addr param list. We mark addresses of the 1286 * type not supported by the peer as unconfirmed. 1287 * 1288 * In case of INIT processing we look for supported address types in the 1289 * supported address param, if present. In both cases the address type in 1290 * the IP header is supported as well as types for addresses in the param 1291 * list, if any. 1292 * 1293 * Once we have the supported address types sctp_check_saddr() runs through 1294 * the source address list and deletes or marks as unconfirmed address of 1295 * types not supported by the peer. 1296 * 1297 * Returns 0 on success, sys errno on failure 1298 */ 1299 int 1300 sctp_get_addrparams(sctp_t *sctp, sctp_t *psctp, mblk_t *pkt, 1301 sctp_chunk_hdr_t *ich, uint_t *sctp_options) 1302 { 1303 sctp_init_chunk_t *init; 1304 ipha_t *iph; 1305 ip6_t *ip6h; 1306 in6_addr_t hdrsaddr[1]; 1307 in6_addr_t hdrdaddr[1]; 1308 sctp_parm_hdr_t *ph; 1309 ssize_t remaining; 1310 int isv4; 1311 int err; 1312 sctp_faddr_t *fp; 1313 int supp_af = 0; 1314 boolean_t check_saddr = B_TRUE; 1315 in6_addr_t curaddr; 1316 sctp_stack_t *sctps = sctp->sctp_sctps; 1317 1318 if (sctp_options != NULL) 1319 *sctp_options = 0; 1320 1321 /* extract the address from the IP header */ 1322 isv4 = (IPH_HDR_VERSION(pkt->b_rptr) == IPV4_VERSION); 1323 if (isv4) { 1324 iph = (ipha_t *)pkt->b_rptr; 1325 IN6_IPADDR_TO_V4MAPPED(iph->ipha_src, hdrsaddr); 1326 IN6_IPADDR_TO_V4MAPPED(iph->ipha_dst, hdrdaddr); 1327 supp_af |= PARM_SUPP_V4; 1328 } else { 1329 ip6h = (ip6_t *)pkt->b_rptr; 1330 hdrsaddr[0] = ip6h->ip6_src; 1331 hdrdaddr[0] = ip6h->ip6_dst; 1332 supp_af |= PARM_SUPP_V6; 1333 } 1334 1335 /* 1336 * Unfortunately, we can't delay this because adding an faddr 1337 * looks for the presence of the source address (from the ire 1338 * for the faddr) in the source address list. We could have 1339 * delayed this if, say, this was a loopback/linklocal connection. 1340 * Now, we just end up nuking this list and taking the addr from 1341 * the IP header for loopback/linklocal. 1342 */ 1343 if (psctp != NULL && psctp->sctp_nsaddrs > 0) { 1344 ASSERT(sctp->sctp_nsaddrs == 0); 1345 1346 err = sctp_dup_saddrs(psctp, sctp, KM_NOSLEEP); 1347 if (err != 0) 1348 return (err); 1349 } 1350 /* 1351 * We will add the faddr before parsing the address list as this 1352 * might be a loopback connection and we would not have to 1353 * go through the list. 1354 * 1355 * Make sure the header's addr is in the list 1356 */ 1357 fp = sctp_lookup_faddr(sctp, hdrsaddr); 1358 if (fp == NULL) { 1359 /* not included; add it now */ 1360 err = sctp_add_faddr(sctp, hdrsaddr, KM_NOSLEEP, B_TRUE); 1361 if (err != 0) 1362 return (err); 1363 1364 /* sctp_faddrs will be the hdr addr */ 1365 fp = sctp->sctp_faddrs; 1366 } 1367 /* make the header addr the primary */ 1368 1369 if (cl_sctp_assoc_change != NULL && psctp == NULL) 1370 curaddr = sctp->sctp_current->faddr; 1371 1372 sctp->sctp_primary = fp; 1373 sctp->sctp_current = fp; 1374 sctp->sctp_mss = fp->sfa_pmss; 1375 1376 /* For loopback connections & linklocal get address from the header */ 1377 if (sctp->sctp_loopback || sctp->sctp_linklocal) { 1378 if (sctp->sctp_nsaddrs != 0) 1379 sctp_free_saddrs(sctp); 1380 if ((err = sctp_saddr_add_addr(sctp, hdrdaddr, 0)) != 0) 1381 return (err); 1382 /* For loopback ignore address list */ 1383 if (sctp->sctp_loopback) 1384 return (0); 1385 check_saddr = B_FALSE; 1386 } 1387 1388 /* Walk the params in the INIT [ACK], pulling out addr params */ 1389 remaining = ntohs(ich->sch_len) - sizeof (*ich) - 1390 sizeof (sctp_init_chunk_t); 1391 if (remaining < sizeof (*ph)) { 1392 if (check_saddr) { 1393 sctp_check_saddr(sctp, supp_af, psctp == NULL ? 1394 B_FALSE : B_TRUE, hdrdaddr); 1395 } 1396 ASSERT(sctp_saddr_lookup(sctp, hdrdaddr, 0) != NULL); 1397 return (0); 1398 } 1399 1400 init = (sctp_init_chunk_t *)(ich + 1); 1401 ph = (sctp_parm_hdr_t *)(init + 1); 1402 1403 /* params will have already been byteordered when validating */ 1404 while (ph != NULL) { 1405 if (ph->sph_type == htons(PARM_SUPP_ADDRS)) { 1406 int plen; 1407 uint16_t *p; 1408 uint16_t addrtype; 1409 1410 ASSERT(psctp != NULL); 1411 plen = ntohs(ph->sph_len); 1412 p = (uint16_t *)(ph + 1); 1413 while (plen > 0) { 1414 addrtype = ntohs(*p); 1415 switch (addrtype) { 1416 case PARM_ADDR6: 1417 supp_af |= PARM_SUPP_V6; 1418 break; 1419 case PARM_ADDR4: 1420 supp_af |= PARM_SUPP_V4; 1421 break; 1422 default: 1423 break; 1424 } 1425 p++; 1426 plen -= sizeof (*p); 1427 } 1428 } else if (ph->sph_type == htons(PARM_ADDR4)) { 1429 if (remaining >= PARM_ADDR4_LEN) { 1430 in6_addr_t addr; 1431 ipaddr_t ta; 1432 1433 supp_af |= PARM_SUPP_V4; 1434 /* 1435 * Screen out broad/multicasts & loopback. 1436 * If the endpoint only accepts v6 address, 1437 * go to the next one. 1438 * 1439 * Subnet broadcast check is done in 1440 * sctp_add_faddr(). If the address is 1441 * a broadcast address, it won't be added. 1442 */ 1443 bcopy(ph + 1, &ta, sizeof (ta)); 1444 if (ta == 0 || 1445 ta == INADDR_BROADCAST || 1446 ta == htonl(INADDR_LOOPBACK) || 1447 IN_MULTICAST(ta) || 1448 sctp->sctp_connp->conn_ipv6_v6only) { 1449 goto next; 1450 } 1451 IN6_INADDR_TO_V4MAPPED((struct in_addr *) 1452 (ph + 1), &addr); 1453 1454 /* Check for duplicate. */ 1455 if (sctp_lookup_faddr(sctp, &addr) != NULL) 1456 goto next; 1457 1458 /* OK, add it to the faddr set */ 1459 err = sctp_add_faddr(sctp, &addr, KM_NOSLEEP, 1460 B_FALSE); 1461 /* Something is wrong... Try the next one. */ 1462 if (err != 0) 1463 goto next; 1464 } 1465 } else if (ph->sph_type == htons(PARM_ADDR6) && 1466 sctp->sctp_family == AF_INET6) { 1467 /* An v4 socket should not take v6 addresses. */ 1468 if (remaining >= PARM_ADDR6_LEN) { 1469 in6_addr_t *addr6; 1470 1471 supp_af |= PARM_SUPP_V6; 1472 addr6 = (in6_addr_t *)(ph + 1); 1473 /* 1474 * Screen out link locals, mcast, loopback 1475 * and bogus v6 address. 1476 */ 1477 if (IN6_IS_ADDR_LINKLOCAL(addr6) || 1478 IN6_IS_ADDR_MULTICAST(addr6) || 1479 IN6_IS_ADDR_LOOPBACK(addr6) || 1480 IN6_IS_ADDR_V4MAPPED(addr6)) { 1481 goto next; 1482 } 1483 /* Check for duplicate. */ 1484 if (sctp_lookup_faddr(sctp, addr6) != NULL) 1485 goto next; 1486 1487 err = sctp_add_faddr(sctp, 1488 (in6_addr_t *)(ph + 1), KM_NOSLEEP, 1489 B_FALSE); 1490 /* Something is wrong... Try the next one. */ 1491 if (err != 0) 1492 goto next; 1493 } 1494 } else if (ph->sph_type == htons(PARM_FORWARD_TSN)) { 1495 if (sctp_options != NULL) 1496 *sctp_options |= SCTP_PRSCTP_OPTION; 1497 } /* else; skip */ 1498 1499 next: 1500 ph = sctp_next_parm(ph, &remaining); 1501 } 1502 if (check_saddr) { 1503 sctp_check_saddr(sctp, supp_af, psctp == NULL ? B_FALSE : 1504 B_TRUE, hdrdaddr); 1505 } 1506 ASSERT(sctp_saddr_lookup(sctp, hdrdaddr, 0) != NULL); 1507 /* 1508 * We have the right address list now, update clustering's 1509 * knowledge because when we sent the INIT we had just added 1510 * the address the INIT was sent to. 1511 */ 1512 if (psctp == NULL && cl_sctp_assoc_change != NULL) { 1513 uchar_t *alist; 1514 size_t asize; 1515 uchar_t *dlist; 1516 size_t dsize; 1517 1518 asize = sizeof (in6_addr_t) * sctp->sctp_nfaddrs; 1519 alist = kmem_alloc(asize, KM_NOSLEEP); 1520 if (alist == NULL) { 1521 SCTP_KSTAT(sctps, sctp_cl_assoc_change); 1522 return (ENOMEM); 1523 } 1524 /* 1525 * Just include the address the INIT was sent to in the 1526 * delete list and send the entire faddr list. We could 1527 * do it differently (i.e include all the addresses in the 1528 * add list even if it contains the original address OR 1529 * remove the original address from the add list etc.), but 1530 * this seems reasonable enough. 1531 */ 1532 dsize = sizeof (in6_addr_t); 1533 dlist = kmem_alloc(dsize, KM_NOSLEEP); 1534 if (dlist == NULL) { 1535 kmem_free(alist, asize); 1536 SCTP_KSTAT(sctps, sctp_cl_assoc_change); 1537 return (ENOMEM); 1538 } 1539 bcopy(&curaddr, dlist, sizeof (curaddr)); 1540 sctp_get_faddr_list(sctp, alist, asize); 1541 (*cl_sctp_assoc_change)(sctp->sctp_family, alist, asize, 1542 sctp->sctp_nfaddrs, dlist, dsize, 1, SCTP_CL_PADDR, 1543 (cl_sctp_handle_t)sctp); 1544 /* alist and dlist will be freed by the clustering module */ 1545 } 1546 return (0); 1547 } 1548 1549 /* 1550 * Returns 0 if the check failed and the restart should be refused, 1551 * 1 if the check succeeded. 1552 */ 1553 int 1554 sctp_secure_restart_check(mblk_t *pkt, sctp_chunk_hdr_t *ich, uint32_t ports, 1555 int sleep, sctp_stack_t *sctps) 1556 { 1557 sctp_faddr_t *fp, *fphead = NULL; 1558 sctp_parm_hdr_t *ph; 1559 ssize_t remaining; 1560 int isv4; 1561 ipha_t *iph; 1562 ip6_t *ip6h; 1563 in6_addr_t hdraddr[1]; 1564 int retval = 0; 1565 sctp_tf_t *tf; 1566 sctp_t *sctp; 1567 int compres; 1568 sctp_init_chunk_t *init; 1569 int nadded = 0; 1570 1571 /* extract the address from the IP header */ 1572 isv4 = (IPH_HDR_VERSION(pkt->b_rptr) == IPV4_VERSION); 1573 if (isv4) { 1574 iph = (ipha_t *)pkt->b_rptr; 1575 IN6_IPADDR_TO_V4MAPPED(iph->ipha_src, hdraddr); 1576 } else { 1577 ip6h = (ip6_t *)pkt->b_rptr; 1578 hdraddr[0] = ip6h->ip6_src; 1579 } 1580 1581 /* Walk the params in the INIT [ACK], pulling out addr params */ 1582 remaining = ntohs(ich->sch_len) - sizeof (*ich) - 1583 sizeof (sctp_init_chunk_t); 1584 if (remaining < sizeof (*ph)) { 1585 /* no parameters; restart OK */ 1586 return (1); 1587 } 1588 init = (sctp_init_chunk_t *)(ich + 1); 1589 ph = (sctp_parm_hdr_t *)(init + 1); 1590 1591 while (ph != NULL) { 1592 sctp_faddr_t *fpa = NULL; 1593 1594 /* params will have already been byteordered when validating */ 1595 if (ph->sph_type == htons(PARM_ADDR4)) { 1596 if (remaining >= PARM_ADDR4_LEN) { 1597 in6_addr_t addr; 1598 IN6_INADDR_TO_V4MAPPED((struct in_addr *) 1599 (ph + 1), &addr); 1600 fpa = kmem_cache_alloc(sctp_kmem_faddr_cache, 1601 sleep); 1602 if (fpa == NULL) { 1603 goto done; 1604 } 1605 bzero(fpa, sizeof (*fpa)); 1606 fpa->faddr = addr; 1607 fpa->next = NULL; 1608 } 1609 } else if (ph->sph_type == htons(PARM_ADDR6)) { 1610 if (remaining >= PARM_ADDR6_LEN) { 1611 fpa = kmem_cache_alloc(sctp_kmem_faddr_cache, 1612 sleep); 1613 if (fpa == NULL) { 1614 goto done; 1615 } 1616 bzero(fpa, sizeof (*fpa)); 1617 bcopy(ph + 1, &fpa->faddr, 1618 sizeof (fpa->faddr)); 1619 fpa->next = NULL; 1620 } 1621 } 1622 /* link in the new addr, if it was an addr param */ 1623 if (fpa != NULL) { 1624 if (fphead == NULL) { 1625 fphead = fpa; 1626 } else { 1627 fpa->next = fphead; 1628 fphead = fpa; 1629 } 1630 } 1631 1632 ph = sctp_next_parm(ph, &remaining); 1633 } 1634 1635 if (fphead == NULL) { 1636 /* no addr parameters; restart OK */ 1637 return (1); 1638 } 1639 1640 /* 1641 * got at least one; make sure the header's addr is 1642 * in the list 1643 */ 1644 fp = sctp_lookup_faddr_nosctp(fphead, hdraddr); 1645 if (fp == NULL) { 1646 /* not included; add it now */ 1647 fp = kmem_cache_alloc(sctp_kmem_faddr_cache, sleep); 1648 if (fp == NULL) { 1649 goto done; 1650 } 1651 bzero(fp, sizeof (*fp)); 1652 fp->faddr = *hdraddr; 1653 fp->next = fphead; 1654 fphead = fp; 1655 } 1656 1657 /* 1658 * Now, we can finally do the check: For each sctp instance 1659 * on the hash line for ports, compare its faddr set against 1660 * the new one. If the new one is a strict subset of any 1661 * existing sctp's faddrs, the restart is OK. However, if there 1662 * is an overlap, this could be an attack, so return failure. 1663 * If all sctp's faddrs are disjoint, this is a legitimate new 1664 * association. 1665 */ 1666 tf = &(sctps->sctps_conn_fanout[SCTP_CONN_HASH(sctps, ports)]); 1667 mutex_enter(&tf->tf_lock); 1668 1669 for (sctp = tf->tf_sctp; sctp; sctp = sctp->sctp_conn_hash_next) { 1670 if (ports != sctp->sctp_ports) { 1671 continue; 1672 } 1673 compres = sctp_compare_faddrsets(fphead, sctp->sctp_faddrs); 1674 if (compres <= SCTP_ADDR_SUBSET) { 1675 retval = 1; 1676 mutex_exit(&tf->tf_lock); 1677 goto done; 1678 } 1679 if (compres == SCTP_ADDR_OVERLAP) { 1680 dprint(1, 1681 ("new assoc from %x:%x:%x:%x overlaps with %p\n", 1682 SCTP_PRINTADDR(*hdraddr), (void *)sctp)); 1683 /* 1684 * While we still hold the lock, we need to 1685 * figure out which addresses have been 1686 * added so we can include them in the abort 1687 * we will send back. Since these faddrs will 1688 * never be used, we overload the rto field 1689 * here, setting it to 0 if the address was 1690 * not added, 1 if it was added. 1691 */ 1692 for (fp = fphead; fp; fp = fp->next) { 1693 if (sctp_lookup_faddr(sctp, &fp->faddr)) { 1694 fp->rto = 0; 1695 } else { 1696 fp->rto = 1; 1697 nadded++; 1698 } 1699 } 1700 mutex_exit(&tf->tf_lock); 1701 goto done; 1702 } 1703 } 1704 mutex_exit(&tf->tf_lock); 1705 1706 /* All faddrs are disjoint; legit new association */ 1707 retval = 1; 1708 1709 done: 1710 /* If are attempted adds, send back an abort listing the addrs */ 1711 if (nadded > 0) { 1712 void *dtail; 1713 size_t dlen; 1714 1715 dtail = kmem_alloc(PARM_ADDR6_LEN * nadded, KM_NOSLEEP); 1716 if (dtail == NULL) { 1717 goto cleanup; 1718 } 1719 1720 ph = dtail; 1721 dlen = 0; 1722 for (fp = fphead; fp; fp = fp->next) { 1723 if (fp->rto == 0) { 1724 continue; 1725 } 1726 if (IN6_IS_ADDR_V4MAPPED(&fp->faddr)) { 1727 ipaddr_t addr4; 1728 1729 ph->sph_type = htons(PARM_ADDR4); 1730 ph->sph_len = htons(PARM_ADDR4_LEN); 1731 IN6_V4MAPPED_TO_IPADDR(&fp->faddr, addr4); 1732 ph++; 1733 bcopy(&addr4, ph, sizeof (addr4)); 1734 ph = (sctp_parm_hdr_t *) 1735 ((char *)ph + sizeof (addr4)); 1736 dlen += PARM_ADDR4_LEN; 1737 } else { 1738 ph->sph_type = htons(PARM_ADDR6); 1739 ph->sph_len = htons(PARM_ADDR6_LEN); 1740 ph++; 1741 bcopy(&fp->faddr, ph, sizeof (fp->faddr)); 1742 ph = (sctp_parm_hdr_t *) 1743 ((char *)ph + sizeof (fp->faddr)); 1744 dlen += PARM_ADDR6_LEN; 1745 } 1746 } 1747 1748 /* Send off the abort */ 1749 sctp_send_abort(sctp, sctp_init2vtag(ich), 1750 SCTP_ERR_RESTART_NEW_ADDRS, dtail, dlen, pkt, 0, B_TRUE); 1751 1752 kmem_free(dtail, PARM_ADDR6_LEN * nadded); 1753 } 1754 1755 cleanup: 1756 /* Clean up */ 1757 if (fphead) { 1758 sctp_faddr_t *fpn; 1759 for (fp = fphead; fp; fp = fpn) { 1760 fpn = fp->next; 1761 kmem_cache_free(sctp_kmem_faddr_cache, fp); 1762 } 1763 } 1764 1765 return (retval); 1766 } 1767 1768 /* 1769 * Reset any state related to transmitted chunks. 1770 */ 1771 void 1772 sctp_congest_reset(sctp_t *sctp) 1773 { 1774 sctp_faddr_t *fp; 1775 sctp_stack_t *sctps = sctp->sctp_sctps; 1776 mblk_t *mp; 1777 1778 for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->next) { 1779 fp->ssthresh = sctps->sctps_initial_mtu; 1780 SET_CWND(fp, fp->sfa_pmss, sctps->sctps_slow_start_initial); 1781 fp->suna = 0; 1782 fp->pba = 0; 1783 } 1784 /* 1785 * Clean up the transmit list as well since we have reset accounting 1786 * on all the fps. Send event upstream, if required. 1787 */ 1788 while ((mp = sctp->sctp_xmit_head) != NULL) { 1789 sctp->sctp_xmit_head = mp->b_next; 1790 mp->b_next = NULL; 1791 if (sctp->sctp_xmit_head != NULL) 1792 sctp->sctp_xmit_head->b_prev = NULL; 1793 sctp_sendfail_event(sctp, mp, 0, B_TRUE); 1794 } 1795 sctp->sctp_xmit_head = NULL; 1796 sctp->sctp_xmit_tail = NULL; 1797 sctp->sctp_xmit_unacked = NULL; 1798 1799 sctp->sctp_unacked = 0; 1800 /* 1801 * Any control message as well. We will clean-up this list as well. 1802 * This contains any pending ASCONF request that we have queued/sent. 1803 * If we do get an ACK we will just drop it. However, given that 1804 * we are restarting chances are we aren't going to get any. 1805 */ 1806 if (sctp->sctp_cxmit_list != NULL) 1807 sctp_asconf_free_cxmit(sctp, NULL); 1808 sctp->sctp_cxmit_list = NULL; 1809 sctp->sctp_cchunk_pend = 0; 1810 1811 sctp->sctp_rexmitting = B_FALSE; 1812 sctp->sctp_rxt_nxttsn = 0; 1813 sctp->sctp_rxt_maxtsn = 0; 1814 1815 sctp->sctp_zero_win_probe = B_FALSE; 1816 } 1817 1818 static void 1819 sctp_init_faddr(sctp_t *sctp, sctp_faddr_t *fp, in6_addr_t *addr, 1820 mblk_t *timer_mp) 1821 { 1822 sctp_stack_t *sctps = sctp->sctp_sctps; 1823 1824 bcopy(addr, &fp->faddr, sizeof (*addr)); 1825 if (IN6_IS_ADDR_V4MAPPED(addr)) { 1826 fp->isv4 = 1; 1827 /* Make sure that sfa_pmss is a multiple of SCTP_ALIGN. */ 1828 fp->sfa_pmss = 1829 (sctps->sctps_initial_mtu - sctp->sctp_hdr_len) & 1830 ~(SCTP_ALIGN - 1); 1831 } else { 1832 fp->isv4 = 0; 1833 fp->sfa_pmss = 1834 (sctps->sctps_initial_mtu - sctp->sctp_hdr6_len) & 1835 ~(SCTP_ALIGN - 1); 1836 } 1837 fp->cwnd = sctps->sctps_slow_start_initial * fp->sfa_pmss; 1838 fp->rto = MIN(sctp->sctp_rto_initial, sctp->sctp_init_rto_max); 1839 fp->srtt = -1; 1840 fp->rtt_updates = 0; 1841 fp->strikes = 0; 1842 fp->max_retr = sctp->sctp_pp_max_rxt; 1843 /* Mark it as not confirmed. */ 1844 fp->state = SCTP_FADDRS_UNCONFIRMED; 1845 fp->hb_interval = sctp->sctp_hb_interval; 1846 fp->ssthresh = sctps->sctps_initial_ssthresh; 1847 fp->suna = 0; 1848 fp->pba = 0; 1849 fp->acked = 0; 1850 fp->lastactive = lbolt64; 1851 fp->timer_mp = timer_mp; 1852 fp->hb_pending = B_FALSE; 1853 fp->hb_enabled = B_TRUE; 1854 fp->timer_running = 0; 1855 fp->df = 1; 1856 fp->pmtu_discovered = 0; 1857 fp->rc_timer_mp = NULL; 1858 fp->rc_timer_running = 0; 1859 fp->next = NULL; 1860 fp->ire = NULL; 1861 fp->T3expire = 0; 1862 (void) random_get_pseudo_bytes((uint8_t *)&fp->hb_secret, 1863 sizeof (fp->hb_secret)); 1864 fp->hb_expiry = lbolt64; 1865 fp->rxt_unacked = 0; 1866 1867 sctp_get_ire(sctp, fp); 1868 } 1869 1870 /*ARGSUSED*/ 1871 static void 1872 faddr_destructor(void *buf, void *cdrarg) 1873 { 1874 sctp_faddr_t *fp = buf; 1875 1876 ASSERT(fp->timer_mp == NULL); 1877 ASSERT(fp->timer_running == 0); 1878 1879 ASSERT(fp->rc_timer_mp == NULL); 1880 ASSERT(fp->rc_timer_running == 0); 1881 } 1882 1883 void 1884 sctp_faddr_init(void) 1885 { 1886 sctp_kmem_faddr_cache = kmem_cache_create("sctp_faddr_cache", 1887 sizeof (sctp_faddr_t), 0, NULL, faddr_destructor, 1888 NULL, NULL, NULL, 0); 1889 } 1890 1891 void 1892 sctp_faddr_fini(void) 1893 { 1894 kmem_cache_destroy(sctp_kmem_faddr_cache); 1895 } 1896