xref: /titanic_44/usr/src/uts/common/inet/sctp/sctp_addr.c (revision c5a5e6f47e8f40ef4f4a14b199b09585e3ecf9a0)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2004, 2010, Oracle and/or its affiliates. All rights reserved.
23  */
24 
25 #include <sys/types.h>
26 #include <sys/systm.h>
27 #include <sys/stream.h>
28 #include <sys/cmn_err.h>
29 #include <sys/ddi.h>
30 #include <sys/sunddi.h>
31 #include <sys/kmem.h>
32 #include <sys/socket.h>
33 #include <sys/sysmacros.h>
34 #include <sys/list.h>
35 
36 #include <netinet/in.h>
37 #include <netinet/ip6.h>
38 #include <netinet/sctp.h>
39 
40 #include <inet/common.h>
41 #include <inet/ip.h>
42 #include <inet/ip6.h>
43 #include <inet/ip_ire.h>
44 #include <inet/ip_if.h>
45 #include <inet/ipclassifier.h>
46 #include <inet/sctp_ip.h>
47 #include "sctp_impl.h"
48 #include "sctp_addr.h"
49 
50 static void		sctp_ipif_inactive(sctp_ipif_t *);
51 static sctp_ipif_t	*sctp_lookup_ipif_addr(in6_addr_t *, boolean_t,
52 			    zoneid_t, boolean_t, uint_t, uint_t, boolean_t,
53 			    sctp_stack_t *);
54 static int		sctp_get_all_ipifs(sctp_t *, int);
55 static int		sctp_ipif_hash_insert(sctp_t *, sctp_ipif_t *, int,
56 			    boolean_t, boolean_t);
57 static void		sctp_ipif_hash_remove(sctp_t *, sctp_ipif_t *,
58 			    boolean_t);
59 static void		sctp_fix_saddr(sctp_t *, in6_addr_t *);
60 static int		sctp_compare_ipif_list(sctp_ipif_hash_t *,
61 			    sctp_ipif_hash_t *);
62 static int		sctp_copy_ipifs(sctp_ipif_hash_t *, sctp_t *, int);
63 
64 #define	SCTP_ADDR4_HASH(addr)	\
65 	(((addr) ^ ((addr) >> 8) ^ ((addr) >> 16) ^ ((addr) >> 24)) &	\
66 	(SCTP_IPIF_HASH - 1))
67 
68 #define	SCTP_ADDR6_HASH(addr)	\
69 	(((addr).s6_addr32[3] ^						\
70 	(((addr).s6_addr32[3] ^ (addr).s6_addr32[2]) >> 12)) &		\
71 	(SCTP_IPIF_HASH - 1))
72 
73 #define	SCTP_IPIF_ADDR_HASH(addr, isv6)					\
74 	((isv6) ? SCTP_ADDR6_HASH((addr)) : 				\
75 	SCTP_ADDR4_HASH((addr)._S6_un._S6_u32[3]))
76 
77 #define	SCTP_IPIF_USABLE(sctp_ipif_state)	\
78 	((sctp_ipif_state) == SCTP_IPIFS_UP ||	\
79 	(sctp_ipif_state) ==  SCTP_IPIFS_DOWN)
80 
81 #define	SCTP_IPIF_DISCARD(sctp_ipif_flags)	\
82 	((sctp_ipif_flags) & (IPIF_PRIVATE | IPIF_DEPRECATED))
83 
84 #define	SCTP_IS_IPIF_LOOPBACK(ipif)		\
85 	((ipif)->sctp_ipif_ill->sctp_ill_flags & PHYI_LOOPBACK)
86 
87 #define	SCTP_IS_IPIF_LINKLOCAL(ipif)		\
88 	((ipif)->sctp_ipif_isv6 && 		\
89 	IN6_IS_ADDR_LINKLOCAL(&(ipif)->sctp_ipif_saddr))
90 
91 #define	SCTP_UNSUPP_AF(ipif, supp_af)	\
92 	((!(ipif)->sctp_ipif_isv6 && !((supp_af) & PARM_SUPP_V4)) ||	\
93 	((ipif)->sctp_ipif_isv6 && !((supp_af) & PARM_SUPP_V6)))
94 
95 #define	SCTP_IPIF_ZONE_MATCH(sctp, ipif) 				\
96 	IPCL_ZONE_MATCH((sctp)->sctp_connp, (ipif)->sctp_ipif_zoneid)
97 
98 #define	SCTP_ILL_HASH_FN(index)		((index) % SCTP_ILL_HASH)
99 #define	SCTP_ILL_TO_PHYINDEX(ill)	((ill)->ill_phyint->phyint_ifindex)
100 
101 /*
102  * SCTP Interface list manipulation functions, locking used.
103  */
104 
105 /*
106  * Delete an SCTP IPIF from the list if the refcount goes to 0 and it is
107  * marked as condemned. Also, check if the ILL needs to go away.
108  */
109 static void
110 sctp_ipif_inactive(sctp_ipif_t *sctp_ipif)
111 {
112 	sctp_ill_t	*sctp_ill;
113 	uint_t		hindex;
114 	uint_t		ill_index;
115 	sctp_stack_t	*sctps = sctp_ipif->sctp_ipif_ill->
116 	    sctp_ill_netstack->netstack_sctp;
117 
118 	rw_enter(&sctps->sctps_g_ills_lock, RW_READER);
119 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_WRITER);
120 
121 	hindex = SCTP_IPIF_ADDR_HASH(sctp_ipif->sctp_ipif_saddr,
122 	    sctp_ipif->sctp_ipif_isv6);
123 
124 	sctp_ill = sctp_ipif->sctp_ipif_ill;
125 	ASSERT(sctp_ill != NULL);
126 	ill_index = SCTP_ILL_HASH_FN(sctp_ill->sctp_ill_index);
127 	if (sctp_ipif->sctp_ipif_state != SCTP_IPIFS_CONDEMNED ||
128 	    sctp_ipif->sctp_ipif_refcnt != 0) {
129 		rw_exit(&sctps->sctps_g_ipifs_lock);
130 		rw_exit(&sctps->sctps_g_ills_lock);
131 		return;
132 	}
133 	list_remove(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list,
134 	    sctp_ipif);
135 	sctps->sctps_g_ipifs[hindex].ipif_count--;
136 	sctps->sctps_g_ipifs_count--;
137 	rw_destroy(&sctp_ipif->sctp_ipif_lock);
138 	kmem_free(sctp_ipif, sizeof (sctp_ipif_t));
139 
140 	atomic_dec_32(&sctp_ill->sctp_ill_ipifcnt);
141 	if (rw_tryupgrade(&sctps->sctps_g_ills_lock) != 0) {
142 		rw_downgrade(&sctps->sctps_g_ipifs_lock);
143 		if (sctp_ill->sctp_ill_ipifcnt == 0 &&
144 		    sctp_ill->sctp_ill_state == SCTP_ILLS_CONDEMNED) {
145 			list_remove(&sctps->sctps_g_ills[ill_index].
146 			    sctp_ill_list, (void *)sctp_ill);
147 			sctps->sctps_g_ills[ill_index].ill_count--;
148 			sctps->sctps_ills_count--;
149 			kmem_free(sctp_ill->sctp_ill_name,
150 			    sctp_ill->sctp_ill_name_length);
151 			kmem_free(sctp_ill, sizeof (sctp_ill_t));
152 		}
153 	}
154 	rw_exit(&sctps->sctps_g_ipifs_lock);
155 	rw_exit(&sctps->sctps_g_ills_lock);
156 }
157 
158 /*
159  * Lookup an SCTP IPIF given an IP address. Increments sctp_ipif refcnt.
160  * We are either looking for a IPIF with the given address before
161  * inserting it into the global list or looking for an IPIF for an
162  * address given an SCTP. In the former case we always check the zoneid,
163  * but for the latter case, check_zid could be B_FALSE if the connp
164  * for the sctp has conn_all_zones set. When looking for an address we
165  * give preference to one that is up, so even though we may find one that
166  * is not up we keep looking if there is one up, we hold the down addr
167  * in backup_ipif in case we don't find one that is up - i.e. we return
168  * the backup_ipif in that case. Note that if we are looking for. If we
169  * are specifically looking for an up address, then usable will be set
170  * to true.
171  */
172 static sctp_ipif_t *
173 sctp_lookup_ipif_addr(in6_addr_t *addr, boolean_t refhold, zoneid_t zoneid,
174     boolean_t check_zid, uint_t ifindex, uint_t seqid, boolean_t usable,
175     sctp_stack_t *sctps)
176 {
177 	int		j;
178 	sctp_ipif_t	*sctp_ipif;
179 	sctp_ipif_t	*backup_ipif = NULL;
180 	int		hindex;
181 
182 	hindex = SCTP_IPIF_ADDR_HASH(*addr, !IN6_IS_ADDR_V4MAPPED(addr));
183 
184 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_READER);
185 	if (sctps->sctps_g_ipifs[hindex].ipif_count == 0) {
186 		rw_exit(&sctps->sctps_g_ipifs_lock);
187 		return (NULL);
188 	}
189 	sctp_ipif = list_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list);
190 	for (j = 0; j < sctps->sctps_g_ipifs[hindex].ipif_count; j++) {
191 		rw_enter(&sctp_ipif->sctp_ipif_lock, RW_READER);
192 		if ((!check_zid ||
193 		    (sctp_ipif->sctp_ipif_zoneid == ALL_ZONES ||
194 		    zoneid == sctp_ipif->sctp_ipif_zoneid)) &&
195 		    (ifindex == 0 || ifindex ==
196 		    sctp_ipif->sctp_ipif_ill->sctp_ill_index) &&
197 		    ((seqid != 0 && seqid == sctp_ipif->sctp_ipif_id) ||
198 		    (IN6_ARE_ADDR_EQUAL(&sctp_ipif->sctp_ipif_saddr,
199 		    addr)))) {
200 			if (!usable || sctp_ipif->sctp_ipif_state ==
201 			    SCTP_IPIFS_UP) {
202 				rw_exit(&sctp_ipif->sctp_ipif_lock);
203 				if (refhold)
204 					SCTP_IPIF_REFHOLD(sctp_ipif);
205 				rw_exit(&sctps->sctps_g_ipifs_lock);
206 				return (sctp_ipif);
207 			} else if (sctp_ipif->sctp_ipif_state ==
208 			    SCTP_IPIFS_DOWN && backup_ipif == NULL) {
209 				backup_ipif = sctp_ipif;
210 			}
211 		}
212 		rw_exit(&sctp_ipif->sctp_ipif_lock);
213 		sctp_ipif = list_next(
214 		    &sctps->sctps_g_ipifs[hindex].sctp_ipif_list, sctp_ipif);
215 	}
216 	if (backup_ipif != NULL) {
217 		if (refhold)
218 			SCTP_IPIF_REFHOLD(backup_ipif);
219 		rw_exit(&sctps->sctps_g_ipifs_lock);
220 		return (backup_ipif);
221 	}
222 	rw_exit(&sctps->sctps_g_ipifs_lock);
223 	return (NULL);
224 }
225 
226 /*
227  * Populate the list with all the SCTP ipifs for a given ipversion.
228  * Increments sctp_ipif refcnt.
229  * Called with no locks held.
230  */
231 static int
232 sctp_get_all_ipifs(sctp_t *sctp, int sleep)
233 {
234 	sctp_ipif_t		*sctp_ipif;
235 	int			i;
236 	int			j;
237 	int			error = 0;
238 	sctp_stack_t		*sctps = sctp->sctp_sctps;
239 	boolean_t		isv6;
240 	conn_t			*connp = sctp->sctp_connp;
241 
242 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_READER);
243 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
244 		if (sctps->sctps_g_ipifs[i].ipif_count == 0)
245 			continue;
246 		sctp_ipif = list_head(&sctps->sctps_g_ipifs[i].sctp_ipif_list);
247 		for (j = 0; j < sctps->sctps_g_ipifs[i].ipif_count; j++) {
248 			rw_enter(&sctp_ipif->sctp_ipif_lock, RW_READER);
249 			isv6 = sctp_ipif->sctp_ipif_isv6;
250 			if (SCTP_IPIF_DISCARD(sctp_ipif->sctp_ipif_flags) ||
251 			    !SCTP_IPIF_USABLE(sctp_ipif->sctp_ipif_state) ||
252 			    !SCTP_IPIF_ZONE_MATCH(sctp, sctp_ipif) ||
253 			    SCTP_IS_ADDR_UNSPEC(!isv6,
254 			    sctp_ipif->sctp_ipif_saddr) ||
255 			    (connp->conn_family == AF_INET && isv6) ||
256 			    (connp->conn_ipv6_v6only && !isv6)) {
257 				rw_exit(&sctp_ipif->sctp_ipif_lock);
258 				sctp_ipif = list_next(
259 				    &sctps->sctps_g_ipifs[i].sctp_ipif_list,
260 				    sctp_ipif);
261 				continue;
262 			}
263 			rw_exit(&sctp_ipif->sctp_ipif_lock);
264 			SCTP_IPIF_REFHOLD(sctp_ipif);
265 			error = sctp_ipif_hash_insert(sctp, sctp_ipif, sleep,
266 			    B_FALSE, B_FALSE);
267 			if (error != 0 && error != EALREADY)
268 				goto free_stuff;
269 			sctp_ipif = list_next(
270 			    &sctps->sctps_g_ipifs[i].sctp_ipif_list,
271 			    sctp_ipif);
272 		}
273 	}
274 	rw_exit(&sctps->sctps_g_ipifs_lock);
275 	return (0);
276 free_stuff:
277 	rw_exit(&sctps->sctps_g_ipifs_lock);
278 	sctp_free_saddrs(sctp);
279 	return (ENOMEM);
280 }
281 
282 /*
283  * Given a list of address, fills in the list of SCTP ipifs if all the addresses
284  * are present in the SCTP interface list, return number of addresses filled
285  * or error. If the caller wants the list of addresses, it sends a pre-allocated
286  * buffer - list. Currently, this list is only used on a clustered node when
287  * the SCTP is in the listen state (from sctp_bind_add()). When called on a
288  * clustered node, the input is always a list of addresses (even if the
289  * original bind() was to INADDR_ANY).
290  * Called with no locks held.
291  */
292 int
293 sctp_valid_addr_list(sctp_t *sctp, const void *addrs, uint32_t addrcnt,
294     uchar_t *list, size_t lsize)
295 {
296 	struct sockaddr_in	*sin4;
297 	struct sockaddr_in6	*sin6;
298 	struct in_addr		*addr4;
299 	in6_addr_t		addr;
300 	int			cnt;
301 	int			err = 0;
302 	int			saddr_cnt = 0;
303 	sctp_ipif_t		*ipif;
304 	boolean_t		bind_to_all = B_FALSE;
305 	boolean_t		check_addrs = B_FALSE;
306 	boolean_t		check_lport = B_FALSE;
307 	uchar_t			*p = list;
308 	conn_t			*connp = sctp->sctp_connp;
309 
310 	/*
311 	 * Need to check for port and address depending on the state.
312 	 * After a socket is bound, we need to make sure that subsequent
313 	 * bindx() has correct port.  After an association is established,
314 	 * we need to check for changing the bound address to invalid
315 	 * addresses.
316 	 */
317 	if (sctp->sctp_state >= SCTPS_BOUND) {
318 		check_lport = B_TRUE;
319 		if (sctp->sctp_state > SCTPS_LISTEN)
320 			check_addrs = B_TRUE;
321 	}
322 
323 	if (sctp->sctp_conn_tfp != NULL)
324 		mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
325 	if (sctp->sctp_listen_tfp != NULL)
326 		mutex_enter(&sctp->sctp_listen_tfp->tf_lock);
327 	for (cnt = 0; cnt < addrcnt; cnt++) {
328 		boolean_t	lookup_saddr = B_TRUE;
329 		uint_t		ifindex = 0;
330 
331 		switch (connp->conn_family) {
332 		case AF_INET:
333 			sin4 = (struct sockaddr_in *)addrs + cnt;
334 			if (sin4->sin_family != AF_INET || (check_lport &&
335 			    sin4->sin_port != connp->conn_lport)) {
336 				err = EINVAL;
337 				goto free_ret;
338 			}
339 			addr4 = &sin4->sin_addr;
340 			if (check_addrs &&
341 			    (addr4->s_addr == INADDR_ANY ||
342 			    addr4->s_addr == INADDR_BROADCAST ||
343 			    CLASSD(addr4->s_addr))) {
344 				err = EINVAL;
345 				goto free_ret;
346 			}
347 			IN6_INADDR_TO_V4MAPPED(addr4, &addr);
348 			if (!check_addrs && addr4->s_addr == INADDR_ANY) {
349 				lookup_saddr = B_FALSE;
350 				bind_to_all = B_TRUE;
351 			}
352 
353 			break;
354 		case AF_INET6:
355 			sin6 = (struct sockaddr_in6 *)addrs + cnt;
356 			if (sin6->sin6_family != AF_INET6 || (check_lport &&
357 			    sin6->sin6_port != connp->conn_lport)) {
358 				err = EINVAL;
359 				goto free_ret;
360 			}
361 			addr = sin6->sin6_addr;
362 			/* Contains the interface index */
363 			ifindex = sin6->sin6_scope_id;
364 			if (connp->conn_ipv6_v6only &&
365 			    IN6_IS_ADDR_V4MAPPED(&addr)) {
366 				err = EAFNOSUPPORT;
367 				goto free_ret;
368 			}
369 			if (check_addrs &&
370 			    (IN6_IS_ADDR_LINKLOCAL(&addr) ||
371 			    IN6_IS_ADDR_MULTICAST(&addr) ||
372 			    IN6_IS_ADDR_UNSPECIFIED(&addr))) {
373 				err = EINVAL;
374 				goto free_ret;
375 			}
376 			if (!check_addrs && IN6_IS_ADDR_UNSPECIFIED(&addr)) {
377 				lookup_saddr = B_FALSE;
378 				bind_to_all = B_TRUE;
379 			}
380 
381 			break;
382 		default:
383 			err = EAFNOSUPPORT;
384 			goto free_ret;
385 		}
386 		if (lookup_saddr) {
387 			ipif = sctp_lookup_ipif_addr(&addr, B_TRUE,
388 			    IPCL_ZONEID(connp), !connp->conn_allzones,
389 			    ifindex, 0, B_TRUE, sctp->sctp_sctps);
390 			if (ipif == NULL) {
391 				/* Address not in the list */
392 				err = EINVAL;
393 				goto free_ret;
394 			} else if (check_addrs && SCTP_IS_IPIF_LOOPBACK(ipif) &&
395 			    cl_sctp_check_addrs == NULL) {
396 				SCTP_IPIF_REFRELE(ipif);
397 				err = EINVAL;
398 				goto free_ret;
399 			}
400 		}
401 		if (!bind_to_all) {
402 			/*
403 			 * If an address is added after association setup,
404 			 * we need to wait for the peer to send us an ASCONF
405 			 * ACK before we can start using it.
406 			 * saddr_ipif_dontsrc will be reset (to 0) when we
407 			 * get the ASCONF ACK for this address.
408 			 */
409 			err = sctp_ipif_hash_insert(sctp, ipif, KM_SLEEP,
410 			    check_addrs ? B_TRUE : B_FALSE, B_FALSE);
411 			if (err != 0) {
412 				SCTP_IPIF_REFRELE(ipif);
413 				if (check_addrs && err == EALREADY)
414 					err = EADDRINUSE;
415 				goto free_ret;
416 			}
417 			saddr_cnt++;
418 			if (lsize >= sizeof (addr)) {
419 				bcopy(&addr, p, sizeof (addr));
420 				p += sizeof (addr);
421 				lsize -= sizeof (addr);
422 			}
423 		}
424 	}
425 	if (bind_to_all) {
426 		/*
427 		 * Free whatever we might have added before encountering
428 		 * inaddr_any.
429 		 */
430 		if (sctp->sctp_nsaddrs > 0) {
431 			sctp_free_saddrs(sctp);
432 			ASSERT(sctp->sctp_nsaddrs == 0);
433 		}
434 		err = sctp_get_all_ipifs(sctp, KM_SLEEP);
435 		if (err != 0)
436 			return (err);
437 		sctp->sctp_bound_to_all = 1;
438 	}
439 	if (sctp->sctp_listen_tfp != NULL)
440 		mutex_exit(&sctp->sctp_listen_tfp->tf_lock);
441 	if (sctp->sctp_conn_tfp != NULL)
442 		mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
443 	return (0);
444 free_ret:
445 	if (saddr_cnt != 0)
446 		sctp_del_saddr_list(sctp, addrs, saddr_cnt, B_TRUE);
447 	if (sctp->sctp_listen_tfp != NULL)
448 		mutex_exit(&sctp->sctp_listen_tfp->tf_lock);
449 	if (sctp->sctp_conn_tfp != NULL)
450 		mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
451 	return (err);
452 }
453 
454 static int
455 sctp_ipif_hash_insert(sctp_t *sctp, sctp_ipif_t *ipif, int sleep,
456     boolean_t dontsrc, boolean_t allow_dup)
457 {
458 	int			cnt;
459 	sctp_saddr_ipif_t	*ipif_obj;
460 	int			hindex;
461 
462 	hindex = SCTP_IPIF_ADDR_HASH(ipif->sctp_ipif_saddr,
463 	    ipif->sctp_ipif_isv6);
464 	rw_enter(&sctp->sctp_saddrs[hindex].ipif_hash_lock, RW_WRITER);
465 	ipif_obj = list_head(&sctp->sctp_saddrs[hindex].sctp_ipif_list);
466 	for (cnt = 0; cnt < sctp->sctp_saddrs[hindex].ipif_count; cnt++) {
467 		if (IN6_ARE_ADDR_EQUAL(&ipif_obj->saddr_ipifp->sctp_ipif_saddr,
468 		    &ipif->sctp_ipif_saddr)) {
469 			if (ipif->sctp_ipif_id !=
470 			    ipif_obj->saddr_ipifp->sctp_ipif_id &&
471 			    ipif_obj->saddr_ipifp->sctp_ipif_state ==
472 			    SCTP_IPIFS_DOWN && ipif->sctp_ipif_state ==
473 			    SCTP_IPIFS_UP) {
474 				SCTP_IPIF_REFRELE(ipif_obj->saddr_ipifp);
475 				ipif_obj->saddr_ipifp = ipif;
476 				ipif_obj->saddr_ipif_dontsrc = dontsrc ? 1 : 0;
477 				rw_exit(
478 				    &sctp->sctp_saddrs[hindex].ipif_hash_lock);
479 				return (0);
480 			} else if (!allow_dup || ipif->sctp_ipif_id ==
481 			    ipif_obj->saddr_ipifp->sctp_ipif_id) {
482 				rw_exit(
483 				    &sctp->sctp_saddrs[hindex].ipif_hash_lock);
484 				return (EALREADY);
485 			}
486 		}
487 		ipif_obj = list_next(&sctp->sctp_saddrs[hindex].sctp_ipif_list,
488 		    ipif_obj);
489 	}
490 	ipif_obj = kmem_zalloc(sizeof (sctp_saddr_ipif_t), sleep);
491 	if (ipif_obj == NULL) {
492 		rw_exit(&sctp->sctp_saddrs[hindex].ipif_hash_lock);
493 		/* Need to do something */
494 		return (ENOMEM);
495 	}
496 	ipif_obj->saddr_ipifp = ipif;
497 	ipif_obj->saddr_ipif_dontsrc = dontsrc ? 1 : 0;
498 	list_insert_tail(&sctp->sctp_saddrs[hindex].sctp_ipif_list, ipif_obj);
499 	sctp->sctp_saddrs[hindex].ipif_count++;
500 	sctp->sctp_nsaddrs++;
501 	rw_exit(&sctp->sctp_saddrs[hindex].ipif_hash_lock);
502 	return (0);
503 }
504 
505 /*
506  * Given a source address, walk through the peer address list to see
507  * if the source address is being used.  If it is, reset that.
508  * A cleared saddr will then make sctp_make_mp lookup the destination again
509  * and as part of that look for a new source.
510  */
511 static void
512 sctp_fix_saddr(sctp_t *sctp, in6_addr_t *saddr)
513 {
514 	sctp_faddr_t	*fp;
515 
516 	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->sf_next) {
517 		if (!IN6_ARE_ADDR_EQUAL(&fp->sf_saddr, saddr))
518 			continue;
519 		V6_SET_ZERO(fp->sf_saddr);
520 	}
521 }
522 
523 static void
524 sctp_ipif_hash_remove(sctp_t *sctp, sctp_ipif_t *ipif, boolean_t locked)
525 {
526 	int			cnt;
527 	sctp_saddr_ipif_t	*ipif_obj;
528 	int			hindex;
529 
530 	hindex = SCTP_IPIF_ADDR_HASH(ipif->sctp_ipif_saddr,
531 	    ipif->sctp_ipif_isv6);
532 	if (!locked)
533 		rw_enter(&sctp->sctp_saddrs[hindex].ipif_hash_lock, RW_WRITER);
534 	ipif_obj = list_head(&sctp->sctp_saddrs[hindex].sctp_ipif_list);
535 	for (cnt = 0; cnt < sctp->sctp_saddrs[hindex].ipif_count; cnt++) {
536 		if (IN6_ARE_ADDR_EQUAL(&ipif_obj->saddr_ipifp->sctp_ipif_saddr,
537 		    &ipif->sctp_ipif_saddr)) {
538 			list_remove(&sctp->sctp_saddrs[hindex].sctp_ipif_list,
539 			    ipif_obj);
540 			sctp->sctp_saddrs[hindex].ipif_count--;
541 			sctp->sctp_nsaddrs--;
542 			sctp_fix_saddr(sctp, &ipif->sctp_ipif_saddr);
543 			SCTP_IPIF_REFRELE(ipif_obj->saddr_ipifp);
544 			kmem_free(ipif_obj, sizeof (sctp_saddr_ipif_t));
545 			break;
546 		}
547 		ipif_obj = list_next(&sctp->sctp_saddrs[hindex].sctp_ipif_list,
548 		    ipif_obj);
549 	}
550 	if (!locked)
551 		rw_exit(&sctp->sctp_saddrs[hindex].ipif_hash_lock);
552 }
553 
554 static int
555 sctp_compare_ipif_list(sctp_ipif_hash_t *list1, sctp_ipif_hash_t *list2)
556 {
557 	int			i;
558 	int			j;
559 	sctp_saddr_ipif_t	*obj1;
560 	sctp_saddr_ipif_t	*obj2;
561 	int			overlap = 0;
562 
563 	rw_enter(&list1->ipif_hash_lock, RW_READER);
564 	rw_enter(&list2->ipif_hash_lock, RW_READER);
565 	obj1 = list_head(&list1->sctp_ipif_list);
566 	for (i = 0; i < list1->ipif_count; i++) {
567 		obj2 = list_head(&list2->sctp_ipif_list);
568 		for (j = 0; j < list2->ipif_count; j++) {
569 			if (IN6_ARE_ADDR_EQUAL(
570 			    &obj1->saddr_ipifp->sctp_ipif_saddr,
571 			    &obj2->saddr_ipifp->sctp_ipif_saddr)) {
572 				overlap++;
573 				break;
574 			}
575 			obj2 = list_next(&list2->sctp_ipif_list,
576 			    obj2);
577 		}
578 		obj1 = list_next(&list1->sctp_ipif_list, obj1);
579 	}
580 	rw_exit(&list1->ipif_hash_lock);
581 	rw_exit(&list2->ipif_hash_lock);
582 	return (overlap);
583 }
584 
585 int
586 sctp_compare_saddrs(sctp_t *sctp1, sctp_t *sctp2)
587 {
588 	int		i;
589 	int		overlap = 0;
590 
591 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
592 		overlap += sctp_compare_ipif_list(&sctp1->sctp_saddrs[i],
593 		    &sctp2->sctp_saddrs[i]);
594 	}
595 
596 	if (sctp1->sctp_nsaddrs == sctp2->sctp_nsaddrs &&
597 	    overlap == sctp1->sctp_nsaddrs) {
598 		return (SCTP_ADDR_EQUAL);
599 	}
600 
601 	if (overlap == sctp1->sctp_nsaddrs)
602 		return (SCTP_ADDR_SUBSET);
603 
604 	if (overlap > 0)
605 		return (SCTP_ADDR_OVERLAP);
606 
607 	return (SCTP_ADDR_DISJOINT);
608 }
609 
610 static int
611 sctp_copy_ipifs(sctp_ipif_hash_t *list1, sctp_t *sctp2, int sleep)
612 {
613 	int			i;
614 	sctp_saddr_ipif_t	*obj;
615 	int			error = 0;
616 
617 	rw_enter(&list1->ipif_hash_lock, RW_READER);
618 	obj = list_head(&list1->sctp_ipif_list);
619 	for (i = 0; i < list1->ipif_count; i++) {
620 		SCTP_IPIF_REFHOLD(obj->saddr_ipifp);
621 		error = sctp_ipif_hash_insert(sctp2, obj->saddr_ipifp, sleep,
622 		    B_FALSE, B_FALSE);
623 		ASSERT(error != EALREADY);
624 		if (error != 0) {
625 			rw_exit(&list1->ipif_hash_lock);
626 			return (error);
627 		}
628 		obj = list_next(&list1->sctp_ipif_list, obj);
629 	}
630 	rw_exit(&list1->ipif_hash_lock);
631 	return (error);
632 }
633 
634 int
635 sctp_dup_saddrs(sctp_t *sctp1, sctp_t *sctp2, int sleep)
636 {
637 	int	error = 0;
638 	int	i;
639 
640 	if (sctp1 == NULL || sctp1->sctp_bound_to_all == 1)
641 		return (sctp_get_all_ipifs(sctp2, sleep));
642 
643 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
644 		rw_enter(&sctp1->sctp_saddrs[i].ipif_hash_lock, RW_READER);
645 		if (sctp1->sctp_saddrs[i].ipif_count == 0) {
646 			rw_exit(&sctp1->sctp_saddrs[i].ipif_hash_lock);
647 			continue;
648 		}
649 		error = sctp_copy_ipifs(&sctp1->sctp_saddrs[i], sctp2, sleep);
650 		if (error != 0) {
651 			rw_exit(&sctp1->sctp_saddrs[i].ipif_hash_lock);
652 			sctp_free_saddrs(sctp2);
653 			return (error);
654 		}
655 		rw_exit(&sctp1->sctp_saddrs[i].ipif_hash_lock);
656 	}
657 	return (0);
658 }
659 
660 void
661 sctp_free_saddrs(sctp_t *sctp)
662 {
663 	int			i;
664 	int			l;
665 	sctp_saddr_ipif_t	*obj;
666 
667 	if (sctp->sctp_nsaddrs == 0)
668 		return;
669 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
670 		rw_enter(&sctp->sctp_saddrs[i].ipif_hash_lock, RW_WRITER);
671 		if (sctp->sctp_saddrs[i].ipif_count == 0) {
672 			rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
673 			continue;
674 		}
675 		obj = list_tail(&sctp->sctp_saddrs[i].sctp_ipif_list);
676 		for (l = 0; l < sctp->sctp_saddrs[i].ipif_count; l++) {
677 			list_remove(&sctp->sctp_saddrs[i].sctp_ipif_list, obj);
678 			SCTP_IPIF_REFRELE(obj->saddr_ipifp);
679 			sctp->sctp_nsaddrs--;
680 			kmem_free(obj, sizeof (sctp_saddr_ipif_t));
681 			obj = list_tail(&sctp->sctp_saddrs[i].sctp_ipif_list);
682 		}
683 		sctp->sctp_saddrs[i].ipif_count = 0;
684 		rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
685 	}
686 	if (sctp->sctp_bound_to_all == 1)
687 		sctp->sctp_bound_to_all = 0;
688 	ASSERT(sctp->sctp_nsaddrs == 0);
689 }
690 
691 /*
692  * Add/Delete the given ILL from the SCTP ILL list. Called with no locks
693  * held.
694  */
695 void
696 sctp_update_ill(ill_t *ill, int op)
697 {
698 	int		i;
699 	sctp_ill_t	*sctp_ill = NULL;
700 	uint_t		index;
701 	netstack_t	*ns = ill->ill_ipst->ips_netstack;
702 	sctp_stack_t	*sctps = ns->netstack_sctp;
703 
704 	rw_enter(&sctps->sctps_g_ills_lock, RW_WRITER);
705 
706 	index = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(ill));
707 	sctp_ill = list_head(&sctps->sctps_g_ills[index].sctp_ill_list);
708 	for (i = 0; i < sctps->sctps_g_ills[index].ill_count; i++) {
709 		if ((sctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(ill)) &&
710 		    (sctp_ill->sctp_ill_isv6 == ill->ill_isv6)) {
711 			break;
712 		}
713 		sctp_ill = list_next(&sctps->sctps_g_ills[index].sctp_ill_list,
714 		    sctp_ill);
715 	}
716 
717 	switch (op) {
718 	case SCTP_ILL_INSERT:
719 		if (sctp_ill != NULL) {
720 			/* Unmark it if it is condemned */
721 			if (sctp_ill->sctp_ill_state == SCTP_ILLS_CONDEMNED)
722 				sctp_ill->sctp_ill_state = 0;
723 			rw_exit(&sctps->sctps_g_ills_lock);
724 			return;
725 		}
726 		sctp_ill = kmem_zalloc(sizeof (sctp_ill_t), KM_NOSLEEP);
727 		/* Need to re-try? */
728 		if (sctp_ill == NULL) {
729 			cmn_err(CE_WARN, "sctp_update_ill: error adding "
730 			    "ILL %p to SCTP's ILL list", (void *)ill);
731 			rw_exit(&sctps->sctps_g_ills_lock);
732 			return;
733 		}
734 		sctp_ill->sctp_ill_name = kmem_zalloc(ill->ill_name_length,
735 		    KM_NOSLEEP);
736 		if (sctp_ill->sctp_ill_name == NULL) {
737 			cmn_err(CE_WARN, "sctp_update_ill: error adding "
738 			    "ILL %p to SCTP's ILL list", (void *)ill);
739 			kmem_free(sctp_ill, sizeof (sctp_ill_t));
740 			rw_exit(&sctps->sctps_g_ills_lock);
741 			return;
742 		}
743 		bcopy(ill->ill_name, sctp_ill->sctp_ill_name,
744 		    ill->ill_name_length);
745 		sctp_ill->sctp_ill_name_length = ill->ill_name_length;
746 		sctp_ill->sctp_ill_index = SCTP_ILL_TO_PHYINDEX(ill);
747 		sctp_ill->sctp_ill_flags = ill->ill_phyint->phyint_flags;
748 		sctp_ill->sctp_ill_netstack = ns;	/* No netstack_hold */
749 		sctp_ill->sctp_ill_isv6 = ill->ill_isv6;
750 		list_insert_tail(&sctps->sctps_g_ills[index].sctp_ill_list,
751 		    (void *)sctp_ill);
752 		sctps->sctps_g_ills[index].ill_count++;
753 		sctps->sctps_ills_count++;
754 
755 		break;
756 
757 	case SCTP_ILL_REMOVE:
758 
759 		if (sctp_ill == NULL) {
760 			rw_exit(&sctps->sctps_g_ills_lock);
761 			return;
762 		}
763 		if (sctp_ill->sctp_ill_ipifcnt == 0) {
764 			list_remove(&sctps->sctps_g_ills[index].sctp_ill_list,
765 			    (void *)sctp_ill);
766 			sctps->sctps_g_ills[index].ill_count--;
767 			sctps->sctps_ills_count--;
768 			kmem_free(sctp_ill->sctp_ill_name,
769 			    ill->ill_name_length);
770 			kmem_free(sctp_ill, sizeof (sctp_ill_t));
771 		} else {
772 			sctp_ill->sctp_ill_state = SCTP_ILLS_CONDEMNED;
773 		}
774 
775 		break;
776 	}
777 	rw_exit(&sctps->sctps_g_ills_lock);
778 }
779 
780 /*
781  * The ILL's index is being changed, just remove it from the old list,
782  * change the SCTP ILL's index and re-insert using the new index.
783  */
784 void
785 sctp_ill_reindex(ill_t *ill, uint_t orig_ill_index)
786 {
787 	sctp_ill_t	*sctp_ill = NULL;
788 	sctp_ill_t	*nxt_sill;
789 	uint_t		indx;
790 	uint_t		nindx;
791 	boolean_t	once = B_FALSE;
792 	netstack_t	*ns = ill->ill_ipst->ips_netstack;
793 	sctp_stack_t	*sctps = ns->netstack_sctp;
794 
795 	rw_enter(&sctps->sctps_g_ills_lock, RW_WRITER);
796 
797 	indx = SCTP_ILL_HASH_FN(orig_ill_index);
798 	nindx = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(ill));
799 	sctp_ill = list_head(&sctps->sctps_g_ills[indx].sctp_ill_list);
800 	while (sctp_ill != NULL) {
801 		nxt_sill = list_next(&sctps->sctps_g_ills[indx].sctp_ill_list,
802 		    sctp_ill);
803 		if (sctp_ill->sctp_ill_index == orig_ill_index) {
804 			sctp_ill->sctp_ill_index = SCTP_ILL_TO_PHYINDEX(ill);
805 			/*
806 			 * if the new index hashes to the same value, all's
807 			 * done.
808 			 */
809 			if (nindx != indx) {
810 				list_remove(
811 				    &sctps->sctps_g_ills[indx].sctp_ill_list,
812 				    (void *)sctp_ill);
813 				sctps->sctps_g_ills[indx].ill_count--;
814 				list_insert_tail(
815 				    &sctps->sctps_g_ills[nindx].sctp_ill_list,
816 				    (void *)sctp_ill);
817 				sctps->sctps_g_ills[nindx].ill_count++;
818 			}
819 			if (once)
820 				break;
821 			/* We might have one for v4 and for v6 */
822 			once = B_TRUE;
823 		}
824 		sctp_ill = nxt_sill;
825 	}
826 	rw_exit(&sctps->sctps_g_ills_lock);
827 }
828 
829 /* move ipif from f_ill to t_ill */
830 void
831 sctp_move_ipif(ipif_t *ipif, ill_t *f_ill, ill_t *t_ill)
832 {
833 	sctp_ill_t	*fsctp_ill = NULL;
834 	sctp_ill_t	*tsctp_ill = NULL;
835 	sctp_ipif_t	*sctp_ipif;
836 	uint_t		hindex;
837 	int		i;
838 	netstack_t	*ns = ipif->ipif_ill->ill_ipst->ips_netstack;
839 	sctp_stack_t	*sctps = ns->netstack_sctp;
840 
841 	rw_enter(&sctps->sctps_g_ills_lock, RW_READER);
842 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_READER);
843 
844 	hindex = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(f_ill));
845 	fsctp_ill = list_head(&sctps->sctps_g_ills[hindex].sctp_ill_list);
846 	for (i = 0; i < sctps->sctps_g_ills[hindex].ill_count; i++) {
847 		if (fsctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(f_ill) &&
848 		    fsctp_ill->sctp_ill_isv6 == f_ill->ill_isv6) {
849 			break;
850 		}
851 		fsctp_ill = list_next(
852 		    &sctps->sctps_g_ills[hindex].sctp_ill_list, fsctp_ill);
853 	}
854 
855 	hindex = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(t_ill));
856 	tsctp_ill = list_head(&sctps->sctps_g_ills[hindex].sctp_ill_list);
857 	for (i = 0; i < sctps->sctps_g_ills[hindex].ill_count; i++) {
858 		if (tsctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(t_ill) &&
859 		    tsctp_ill->sctp_ill_isv6 == t_ill->ill_isv6) {
860 			break;
861 		}
862 		tsctp_ill = list_next(
863 		    &sctps->sctps_g_ills[hindex].sctp_ill_list, tsctp_ill);
864 	}
865 
866 	hindex = SCTP_IPIF_ADDR_HASH(ipif->ipif_v6lcl_addr,
867 	    ipif->ipif_ill->ill_isv6);
868 	sctp_ipif = list_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list);
869 	for (i = 0; i < sctps->sctps_g_ipifs[hindex].ipif_count; i++) {
870 		if (sctp_ipif->sctp_ipif_id == ipif->ipif_seqid)
871 			break;
872 		sctp_ipif = list_next(
873 		    &sctps->sctps_g_ipifs[hindex].sctp_ipif_list, sctp_ipif);
874 	}
875 	/* Should be an ASSERT? */
876 	if (fsctp_ill == NULL || tsctp_ill == NULL || sctp_ipif == NULL) {
877 		ip1dbg(("sctp_move_ipif: error moving ipif %p from %p to %p\n",
878 		    (void *)ipif, (void *)f_ill, (void *)t_ill));
879 		rw_exit(&sctps->sctps_g_ipifs_lock);
880 		rw_exit(&sctps->sctps_g_ills_lock);
881 		return;
882 	}
883 	rw_enter(&sctp_ipif->sctp_ipif_lock, RW_WRITER);
884 	ASSERT(sctp_ipif->sctp_ipif_ill == fsctp_ill);
885 	sctp_ipif->sctp_ipif_ill = tsctp_ill;
886 	rw_exit(&sctp_ipif->sctp_ipif_lock);
887 	atomic_dec_32(&fsctp_ill->sctp_ill_ipifcnt);
888 	atomic_inc_32(&tsctp_ill->sctp_ill_ipifcnt);
889 	rw_exit(&sctps->sctps_g_ipifs_lock);
890 	rw_exit(&sctps->sctps_g_ills_lock);
891 }
892 
893 /*
894  * Walk the list of SCTPs and find each that has oipif in it's saddr list, and
895  * if so replace it with nipif.
896  */
897 void
898 sctp_update_saddrs(sctp_ipif_t *oipif, sctp_ipif_t *nipif, int idx,
899     sctp_stack_t *sctps)
900 {
901 	sctp_t			*sctp;
902 	sctp_t			*sctp_prev = NULL;
903 	sctp_saddr_ipif_t	*sobj;
904 	int			count;
905 
906 	mutex_enter(&sctps->sctps_g_lock);
907 	sctp = list_head(&sctps->sctps_g_list);
908 	while (sctp != NULL && oipif->sctp_ipif_refcnt > 0) {
909 		mutex_enter(&sctp->sctp_reflock);
910 		if (sctp->sctp_condemned ||
911 		    sctp->sctp_saddrs[idx].ipif_count <= 0) {
912 			mutex_exit(&sctp->sctp_reflock);
913 			sctp = list_next(&sctps->sctps_g_list, sctp);
914 			continue;
915 		}
916 		sctp->sctp_refcnt++;
917 		mutex_exit(&sctp->sctp_reflock);
918 		mutex_exit(&sctps->sctps_g_lock);
919 		if (sctp_prev != NULL)
920 			SCTP_REFRELE(sctp_prev);
921 
922 		RUN_SCTP(sctp);
923 		sobj = list_head(&sctp->sctp_saddrs[idx].sctp_ipif_list);
924 		for (count = 0; count <
925 		    sctp->sctp_saddrs[idx].ipif_count; count++) {
926 			if (sobj->saddr_ipifp == oipif) {
927 				SCTP_IPIF_REFHOLD(nipif);
928 				sobj->saddr_ipifp = nipif;
929 				ASSERT(oipif->sctp_ipif_refcnt > 0);
930 				/* We have the writer lock */
931 				oipif->sctp_ipif_refcnt--;
932 				/*
933 				 * Can't have more than one referring
934 				 * to the same sctp_ipif.
935 				 */
936 				break;
937 			}
938 			sobj = list_next(&sctp->sctp_saddrs[idx].sctp_ipif_list,
939 			    sobj);
940 		}
941 		WAKE_SCTP(sctp);
942 		sctp_prev = sctp;
943 		mutex_enter(&sctps->sctps_g_lock);
944 		sctp = list_next(&sctps->sctps_g_list, sctp);
945 	}
946 	mutex_exit(&sctps->sctps_g_lock);
947 	if (sctp_prev != NULL)
948 		SCTP_REFRELE(sctp_prev);
949 }
950 
951 /*
952  * Given an ipif, walk the hash list in the global ipif table and for
953  * any other SCTP ipif with the same address and non-zero reference, walk
954  * the SCTP list and update the saddr list, if required, to point to the
955  * new SCTP ipif. If it is a loopback interface, then there could be
956  * multiple interfaces with 127.0.0.1 if there are zones configured, so
957  * check the zoneid in addition to the address.
958  */
959 void
960 sctp_chk_and_updt_saddr(int hindex, sctp_ipif_t *ipif, sctp_stack_t *sctps)
961 {
962 	int		cnt;
963 	sctp_ipif_t	*sipif;
964 
965 	ASSERT(sctps->sctps_g_ipifs[hindex].ipif_count > 0);
966 	ASSERT(ipif->sctp_ipif_state == SCTP_IPIFS_UP);
967 
968 	sipif = list_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list);
969 	for (cnt = 0; cnt < sctps->sctps_g_ipifs[hindex].ipif_count; cnt++) {
970 		rw_enter(&sipif->sctp_ipif_lock, RW_WRITER);
971 		if (sipif->sctp_ipif_id != ipif->sctp_ipif_id &&
972 		    IN6_ARE_ADDR_EQUAL(&sipif->sctp_ipif_saddr,
973 		    &ipif->sctp_ipif_saddr) && sipif->sctp_ipif_refcnt > 0 &&
974 		    (!SCTP_IS_IPIF_LOOPBACK(ipif) || ipif->sctp_ipif_zoneid ==
975 		    sipif->sctp_ipif_zoneid)) {
976 			/*
977 			 * There can only be one address up at any time
978 			 * and we are here because ipif has been brought
979 			 * up.
980 			 */
981 			ASSERT(sipif->sctp_ipif_state != SCTP_IPIFS_UP);
982 			/*
983 			 * Someone has a reference to this we need to update to
984 			 * point to the new sipif.
985 			 */
986 			sctp_update_saddrs(sipif, ipif, hindex, sctps);
987 		}
988 		rw_exit(&sipif->sctp_ipif_lock);
989 		sipif = list_next(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list,
990 		    sipif);
991 	}
992 }
993 
994 /*
995  * Insert a new SCTP ipif using 'ipif'. v6addr is the address that existed
996  * prior to the current address in 'ipif'. Only when an existing address
997  * is changed on an IPIF, will v6addr be specified. If the IPIF already
998  * exists in the global SCTP ipif table, then we either removed it, if
999  * it doesn't have any existing reference, or mark it condemned otherwise.
1000  * If an address is being brought up (IPIF_UP), then we need to scan
1001  * the SCTP list to check if there is any SCTP that points to the *same*
1002  * address on a different SCTP ipif and update in that case.
1003  */
1004 void
1005 sctp_update_ipif_addr(ipif_t *ipif, in6_addr_t v6addr)
1006 {
1007 	ill_t		*ill = ipif->ipif_ill;
1008 	int		i;
1009 	sctp_ill_t	*sctp_ill;
1010 	sctp_ill_t	*osctp_ill;
1011 	sctp_ipif_t	*sctp_ipif = NULL;
1012 	sctp_ipif_t	*osctp_ipif = NULL;
1013 	uint_t		ill_index;
1014 	int		hindex;
1015 	sctp_stack_t	*sctps;
1016 
1017 	sctps = ipif->ipif_ill->ill_ipst->ips_netstack->netstack_sctp;
1018 
1019 	/* Index for new address */
1020 	hindex = SCTP_IPIF_ADDR_HASH(ipif->ipif_v6lcl_addr, ill->ill_isv6);
1021 
1022 	/*
1023 	 * The address on this IPIF is changing, we need to look for
1024 	 * this old address and mark it condemned, before creating
1025 	 * one for the new address.
1026 	 */
1027 	osctp_ipif = sctp_lookup_ipif_addr(&v6addr, B_FALSE,
1028 	    ipif->ipif_zoneid, B_TRUE, SCTP_ILL_TO_PHYINDEX(ill),
1029 	    ipif->ipif_seqid, B_FALSE, sctps);
1030 
1031 	rw_enter(&sctps->sctps_g_ills_lock, RW_READER);
1032 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_WRITER);
1033 
1034 	ill_index = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(ill));
1035 	sctp_ill = list_head(&sctps->sctps_g_ills[ill_index].sctp_ill_list);
1036 	for (i = 0; i < sctps->sctps_g_ills[ill_index].ill_count; i++) {
1037 		if (sctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(ill) &&
1038 		    sctp_ill->sctp_ill_isv6 == ill->ill_isv6) {
1039 			break;
1040 		}
1041 		sctp_ill = list_next(
1042 		    &sctps->sctps_g_ills[ill_index].sctp_ill_list, sctp_ill);
1043 	}
1044 
1045 	if (sctp_ill == NULL) {
1046 		ip1dbg(("sctp_update_ipif_addr: ill not found ..\n"));
1047 		rw_exit(&sctps->sctps_g_ipifs_lock);
1048 		rw_exit(&sctps->sctps_g_ills_lock);
1049 		return;
1050 	}
1051 
1052 	if (osctp_ipif != NULL) {
1053 
1054 		/* The address is the same? */
1055 		if (IN6_ARE_ADDR_EQUAL(&ipif->ipif_v6lcl_addr, &v6addr)) {
1056 			boolean_t	chk_n_updt = B_FALSE;
1057 
1058 			rw_downgrade(&sctps->sctps_g_ipifs_lock);
1059 			rw_enter(&osctp_ipif->sctp_ipif_lock, RW_WRITER);
1060 			if (ipif->ipif_flags & IPIF_UP &&
1061 			    osctp_ipif->sctp_ipif_state != SCTP_IPIFS_UP) {
1062 				osctp_ipif->sctp_ipif_state = SCTP_IPIFS_UP;
1063 				chk_n_updt = B_TRUE;
1064 			} else {
1065 				osctp_ipif->sctp_ipif_state = SCTP_IPIFS_DOWN;
1066 			}
1067 			osctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1068 			rw_exit(&osctp_ipif->sctp_ipif_lock);
1069 			if (chk_n_updt) {
1070 				sctp_chk_and_updt_saddr(hindex, osctp_ipif,
1071 				    sctps);
1072 			}
1073 			rw_exit(&sctps->sctps_g_ipifs_lock);
1074 			rw_exit(&sctps->sctps_g_ills_lock);
1075 			return;
1076 		}
1077 		/*
1078 		 * We are effectively removing this address from the ILL.
1079 		 */
1080 		if (osctp_ipif->sctp_ipif_refcnt != 0) {
1081 			osctp_ipif->sctp_ipif_state = SCTP_IPIFS_CONDEMNED;
1082 		} else {
1083 			list_t		*ipif_list;
1084 			int		ohindex;
1085 
1086 			osctp_ill = osctp_ipif->sctp_ipif_ill;
1087 			/* hash index for the old one */
1088 			ohindex = SCTP_IPIF_ADDR_HASH(
1089 			    osctp_ipif->sctp_ipif_saddr,
1090 			    osctp_ipif->sctp_ipif_isv6);
1091 
1092 			ipif_list =
1093 			    &sctps->sctps_g_ipifs[ohindex].sctp_ipif_list;
1094 
1095 			list_remove(ipif_list, (void *)osctp_ipif);
1096 			sctps->sctps_g_ipifs[ohindex].ipif_count--;
1097 			sctps->sctps_g_ipifs_count--;
1098 			rw_destroy(&osctp_ipif->sctp_ipif_lock);
1099 			kmem_free(osctp_ipif, sizeof (sctp_ipif_t));
1100 			atomic_dec_32(&osctp_ill->sctp_ill_ipifcnt);
1101 		}
1102 	}
1103 
1104 	sctp_ipif = kmem_zalloc(sizeof (sctp_ipif_t), KM_NOSLEEP);
1105 	/* Try again? */
1106 	if (sctp_ipif == NULL) {
1107 		cmn_err(CE_WARN, "sctp_update_ipif_addr: error adding "
1108 		    "IPIF %p to SCTP's IPIF list", (void *)ipif);
1109 		rw_exit(&sctps->sctps_g_ipifs_lock);
1110 		rw_exit(&sctps->sctps_g_ills_lock);
1111 		return;
1112 	}
1113 	sctps->sctps_g_ipifs_count++;
1114 	rw_init(&sctp_ipif->sctp_ipif_lock, NULL, RW_DEFAULT, NULL);
1115 	sctp_ipif->sctp_ipif_saddr = ipif->ipif_v6lcl_addr;
1116 	sctp_ipif->sctp_ipif_ill = sctp_ill;
1117 	sctp_ipif->sctp_ipif_isv6 = ill->ill_isv6;
1118 	sctp_ipif->sctp_ipif_zoneid = ipif->ipif_zoneid;
1119 	sctp_ipif->sctp_ipif_id = ipif->ipif_seqid;
1120 	if (ipif->ipif_flags & IPIF_UP)
1121 		sctp_ipif->sctp_ipif_state = SCTP_IPIFS_UP;
1122 	else
1123 		sctp_ipif->sctp_ipif_state = SCTP_IPIFS_DOWN;
1124 	sctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1125 	/*
1126 	 * We add it to the head so that it is quicker to find good/recent
1127 	 * additions.
1128 	 */
1129 	list_insert_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list,
1130 	    (void *)sctp_ipif);
1131 	sctps->sctps_g_ipifs[hindex].ipif_count++;
1132 	atomic_inc_32(&sctp_ill->sctp_ill_ipifcnt);
1133 	if (sctp_ipif->sctp_ipif_state == SCTP_IPIFS_UP)
1134 		sctp_chk_and_updt_saddr(hindex, sctp_ipif, sctps);
1135 	rw_exit(&sctps->sctps_g_ipifs_lock);
1136 	rw_exit(&sctps->sctps_g_ills_lock);
1137 }
1138 
1139 /* Insert, Remove,  Mark up or Mark down the ipif */
1140 void
1141 sctp_update_ipif(ipif_t *ipif, int op)
1142 {
1143 	ill_t		*ill = ipif->ipif_ill;
1144 	int		i;
1145 	sctp_ill_t	*sctp_ill;
1146 	sctp_ipif_t	*sctp_ipif;
1147 	uint_t		ill_index;
1148 	uint_t		hindex;
1149 	netstack_t	*ns = ipif->ipif_ill->ill_ipst->ips_netstack;
1150 	sctp_stack_t	*sctps = ns->netstack_sctp;
1151 
1152 	ip2dbg(("sctp_update_ipif: %s %d\n", ill->ill_name, ipif->ipif_seqid));
1153 
1154 	rw_enter(&sctps->sctps_g_ills_lock, RW_READER);
1155 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_WRITER);
1156 
1157 	ill_index = SCTP_ILL_HASH_FN(SCTP_ILL_TO_PHYINDEX(ill));
1158 	sctp_ill = list_head(&sctps->sctps_g_ills[ill_index].sctp_ill_list);
1159 	for (i = 0; i < sctps->sctps_g_ills[ill_index].ill_count; i++) {
1160 		if (sctp_ill->sctp_ill_index == SCTP_ILL_TO_PHYINDEX(ill) &&
1161 		    sctp_ill->sctp_ill_isv6 == ill->ill_isv6) {
1162 			break;
1163 		}
1164 		sctp_ill = list_next(
1165 		    &sctps->sctps_g_ills[ill_index].sctp_ill_list, sctp_ill);
1166 	}
1167 	if (sctp_ill == NULL) {
1168 		rw_exit(&sctps->sctps_g_ipifs_lock);
1169 		rw_exit(&sctps->sctps_g_ills_lock);
1170 		return;
1171 	}
1172 
1173 	hindex = SCTP_IPIF_ADDR_HASH(ipif->ipif_v6lcl_addr,
1174 	    ipif->ipif_ill->ill_isv6);
1175 	sctp_ipif = list_head(&sctps->sctps_g_ipifs[hindex].sctp_ipif_list);
1176 	for (i = 0; i < sctps->sctps_g_ipifs[hindex].ipif_count; i++) {
1177 		if (sctp_ipif->sctp_ipif_id == ipif->ipif_seqid) {
1178 			ASSERT(IN6_ARE_ADDR_EQUAL(&sctp_ipif->sctp_ipif_saddr,
1179 			    &ipif->ipif_v6lcl_addr));
1180 			break;
1181 		}
1182 		sctp_ipif = list_next(
1183 		    &sctps->sctps_g_ipifs[hindex].sctp_ipif_list,
1184 		    sctp_ipif);
1185 	}
1186 	if (sctp_ipif == NULL) {
1187 		ip1dbg(("sctp_update_ipif: null sctp_ipif for %d\n", op));
1188 		rw_exit(&sctps->sctps_g_ipifs_lock);
1189 		rw_exit(&sctps->sctps_g_ills_lock);
1190 		return;
1191 	}
1192 	ASSERT(sctp_ill == sctp_ipif->sctp_ipif_ill);
1193 	switch (op) {
1194 	case SCTP_IPIF_REMOVE:
1195 	{
1196 		list_t		*ipif_list;
1197 		list_t		*ill_list;
1198 
1199 		ill_list = &sctps->sctps_g_ills[ill_index].sctp_ill_list;
1200 		ipif_list = &sctps->sctps_g_ipifs[hindex].sctp_ipif_list;
1201 		if (sctp_ipif->sctp_ipif_refcnt != 0) {
1202 			sctp_ipif->sctp_ipif_state = SCTP_IPIFS_CONDEMNED;
1203 			rw_exit(&sctps->sctps_g_ipifs_lock);
1204 			rw_exit(&sctps->sctps_g_ills_lock);
1205 			return;
1206 		}
1207 		list_remove(ipif_list, (void *)sctp_ipif);
1208 		sctps->sctps_g_ipifs[hindex].ipif_count--;
1209 		sctps->sctps_g_ipifs_count--;
1210 		rw_destroy(&sctp_ipif->sctp_ipif_lock);
1211 		kmem_free(sctp_ipif, sizeof (sctp_ipif_t));
1212 		atomic_dec_32(&sctp_ill->sctp_ill_ipifcnt);
1213 		if (rw_tryupgrade(&sctps->sctps_g_ills_lock) != 0) {
1214 			rw_downgrade(&sctps->sctps_g_ipifs_lock);
1215 			if (sctp_ill->sctp_ill_ipifcnt == 0 &&
1216 			    sctp_ill->sctp_ill_state == SCTP_ILLS_CONDEMNED) {
1217 				list_remove(ill_list, (void *)sctp_ill);
1218 				sctps->sctps_ills_count--;
1219 				sctps->sctps_g_ills[ill_index].ill_count--;
1220 				kmem_free(sctp_ill->sctp_ill_name,
1221 				    sctp_ill->sctp_ill_name_length);
1222 				kmem_free(sctp_ill, sizeof (sctp_ill_t));
1223 			}
1224 		}
1225 		break;
1226 	}
1227 
1228 	case SCTP_IPIF_UP:
1229 
1230 		rw_downgrade(&sctps->sctps_g_ipifs_lock);
1231 		rw_enter(&sctp_ipif->sctp_ipif_lock, RW_WRITER);
1232 		sctp_ipif->sctp_ipif_state = SCTP_IPIFS_UP;
1233 		sctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1234 		rw_exit(&sctp_ipif->sctp_ipif_lock);
1235 		sctp_chk_and_updt_saddr(hindex, sctp_ipif,
1236 		    ipif->ipif_ill->ill_ipst->ips_netstack->netstack_sctp);
1237 
1238 		break;
1239 
1240 	case SCTP_IPIF_UPDATE:
1241 
1242 		rw_downgrade(&sctps->sctps_g_ipifs_lock);
1243 		rw_enter(&sctp_ipif->sctp_ipif_lock, RW_WRITER);
1244 		sctp_ipif->sctp_ipif_zoneid = ipif->ipif_zoneid;
1245 		sctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1246 		rw_exit(&sctp_ipif->sctp_ipif_lock);
1247 
1248 		break;
1249 
1250 	case SCTP_IPIF_DOWN:
1251 
1252 		rw_downgrade(&sctps->sctps_g_ipifs_lock);
1253 		rw_enter(&sctp_ipif->sctp_ipif_lock, RW_WRITER);
1254 		sctp_ipif->sctp_ipif_state = SCTP_IPIFS_DOWN;
1255 		sctp_ipif->sctp_ipif_flags = ipif->ipif_flags;
1256 		rw_exit(&sctp_ipif->sctp_ipif_lock);
1257 
1258 		break;
1259 	}
1260 	rw_exit(&sctps->sctps_g_ipifs_lock);
1261 	rw_exit(&sctps->sctps_g_ills_lock);
1262 }
1263 
1264 /*
1265  * SCTP source address list manipulaton, locking not used (except for
1266  * sctp locking by the caller.
1267  */
1268 
1269 /* Remove a specific saddr from the list */
1270 void
1271 sctp_del_saddr(sctp_t *sctp, sctp_saddr_ipif_t *sp)
1272 {
1273 	if (sctp->sctp_conn_tfp != NULL)
1274 		mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
1275 
1276 	if (sctp->sctp_listen_tfp != NULL)
1277 		mutex_enter(&sctp->sctp_listen_tfp->tf_lock);
1278 
1279 	sctp_ipif_hash_remove(sctp, sp->saddr_ipifp, B_FALSE);
1280 
1281 	if (sctp->sctp_bound_to_all == 1)
1282 		sctp->sctp_bound_to_all = 0;
1283 
1284 	if (sctp->sctp_conn_tfp != NULL)
1285 		mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
1286 
1287 	if (sctp->sctp_listen_tfp != NULL)
1288 		mutex_exit(&sctp->sctp_listen_tfp->tf_lock);
1289 }
1290 
1291 /*
1292  * Delete source address from the existing list. No error checking done here
1293  * Called with no locks held.
1294  */
1295 void
1296 sctp_del_saddr_list(sctp_t *sctp, const void *addrs, int addcnt,
1297     boolean_t fanout_locked)
1298 {
1299 	struct sockaddr_in	*sin4;
1300 	struct sockaddr_in6	*sin6;
1301 	int			cnt;
1302 	in6_addr_t		addr;
1303 	sctp_ipif_t		*sctp_ipif;
1304 	int			ifindex = 0;
1305 	conn_t			*connp = sctp->sctp_connp;
1306 
1307 	ASSERT(sctp->sctp_nsaddrs >= addcnt);
1308 
1309 	if (!fanout_locked) {
1310 		if (sctp->sctp_conn_tfp != NULL)
1311 			mutex_enter(&sctp->sctp_conn_tfp->tf_lock);
1312 		if (sctp->sctp_listen_tfp != NULL)
1313 			mutex_enter(&sctp->sctp_listen_tfp->tf_lock);
1314 	}
1315 
1316 	for (cnt = 0; cnt < addcnt; cnt++) {
1317 		switch (connp->conn_family) {
1318 		case AF_INET:
1319 			sin4 = (struct sockaddr_in *)addrs + cnt;
1320 			IN6_INADDR_TO_V4MAPPED(&sin4->sin_addr, &addr);
1321 			break;
1322 
1323 		case AF_INET6:
1324 			sin6 = (struct sockaddr_in6 *)addrs + cnt;
1325 			addr = sin6->sin6_addr;
1326 			ifindex = sin6->sin6_scope_id;
1327 			break;
1328 		}
1329 		sctp_ipif = sctp_lookup_ipif_addr(&addr, B_FALSE,
1330 		    IPCL_ZONEID(connp), !connp->conn_allzones,
1331 		    ifindex, 0, B_TRUE, sctp->sctp_sctps);
1332 		ASSERT(sctp_ipif != NULL);
1333 		sctp_ipif_hash_remove(sctp, sctp_ipif, B_FALSE);
1334 	}
1335 	if (sctp->sctp_bound_to_all == 1)
1336 		sctp->sctp_bound_to_all = 0;
1337 
1338 	if (!fanout_locked) {
1339 		if (sctp->sctp_conn_tfp != NULL)
1340 			mutex_exit(&sctp->sctp_conn_tfp->tf_lock);
1341 		if (sctp->sctp_listen_tfp != NULL)
1342 			mutex_exit(&sctp->sctp_listen_tfp->tf_lock);
1343 	}
1344 }
1345 
1346 /*
1347  * Given an address get the corresponding entry from the list
1348  * Called with no locks held.
1349  */
1350 sctp_saddr_ipif_t *
1351 sctp_saddr_lookup(sctp_t *sctp, in6_addr_t *addr, uint_t ifindex)
1352 {
1353 	int			cnt;
1354 	sctp_saddr_ipif_t	*ipif_obj;
1355 	int			hindex;
1356 	sctp_ipif_t		*sctp_ipif;
1357 
1358 	hindex = SCTP_IPIF_ADDR_HASH(*addr, !IN6_IS_ADDR_V4MAPPED(addr));
1359 	rw_enter(&sctp->sctp_saddrs[hindex].ipif_hash_lock, RW_READER);
1360 	if (sctp->sctp_saddrs[hindex].ipif_count == 0) {
1361 		rw_exit(&sctp->sctp_saddrs[hindex].ipif_hash_lock);
1362 		return (NULL);
1363 	}
1364 
1365 	ipif_obj = list_head(&sctp->sctp_saddrs[hindex].sctp_ipif_list);
1366 	for (cnt = 0; cnt < sctp->sctp_saddrs[hindex].ipif_count; cnt++) {
1367 		sctp_ipif = ipif_obj->saddr_ipifp;
1368 		/*
1369 		 * Zone check shouldn't be needed.
1370 		 */
1371 		if (IN6_ARE_ADDR_EQUAL(addr, &sctp_ipif->sctp_ipif_saddr) &&
1372 		    (ifindex == 0 ||
1373 		    ifindex == sctp_ipif->sctp_ipif_ill->sctp_ill_index) &&
1374 		    SCTP_IPIF_USABLE(sctp_ipif->sctp_ipif_state)) {
1375 			rw_exit(&sctp->sctp_saddrs[hindex].ipif_hash_lock);
1376 			return (ipif_obj);
1377 		}
1378 		ipif_obj = list_next(&sctp->sctp_saddrs[hindex].sctp_ipif_list,
1379 		    ipif_obj);
1380 	}
1381 	rw_exit(&sctp->sctp_saddrs[hindex].ipif_hash_lock);
1382 	return (NULL);
1383 }
1384 
1385 /* Given an address, add it to the source address list */
1386 int
1387 sctp_saddr_add_addr(sctp_t *sctp, in6_addr_t *addr, uint_t ifindex)
1388 {
1389 	sctp_ipif_t		*sctp_ipif;
1390 	conn_t			*connp = sctp->sctp_connp;
1391 
1392 	sctp_ipif = sctp_lookup_ipif_addr(addr, B_TRUE, IPCL_ZONEID(connp),
1393 	    !connp->conn_allzones, ifindex, 0, B_TRUE, sctp->sctp_sctps);
1394 	if (sctp_ipif == NULL)
1395 		return (EINVAL);
1396 
1397 	if (sctp_ipif_hash_insert(sctp, sctp_ipif, KM_NOSLEEP, B_FALSE,
1398 	    B_FALSE) != 0) {
1399 		SCTP_IPIF_REFRELE(sctp_ipif);
1400 		return (EINVAL);
1401 	}
1402 	return (0);
1403 }
1404 
1405 /*
1406  * Remove or mark as dontsrc addresses that are currently not part of the
1407  * association. One would delete addresses when processing an INIT and
1408  * mark as dontsrc when processing an INIT-ACK.
1409  */
1410 void
1411 sctp_check_saddr(sctp_t *sctp, int supp_af, boolean_t delete,
1412     in6_addr_t *no_del_addr)
1413 {
1414 	int			i;
1415 	int			l;
1416 	sctp_saddr_ipif_t	*obj;
1417 	int			scanned = 0;
1418 	int			naddr;
1419 	int			nsaddr;
1420 	conn_t			*connp = sctp->sctp_connp;
1421 
1422 	ASSERT(!sctp->sctp_loopback && !sctp->sctp_linklocal && supp_af != 0);
1423 
1424 	/*
1425 	 * Irregardless of the supported address in the INIT, v4
1426 	 * must be supported.
1427 	 */
1428 	if (connp->conn_family == AF_INET)
1429 		supp_af = PARM_SUPP_V4;
1430 
1431 	nsaddr = sctp->sctp_nsaddrs;
1432 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1433 		rw_enter(&sctp->sctp_saddrs[i].ipif_hash_lock, RW_WRITER);
1434 		if (sctp->sctp_saddrs[i].ipif_count == 0) {
1435 			rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
1436 			continue;
1437 		}
1438 		obj = list_head(&sctp->sctp_saddrs[i].sctp_ipif_list);
1439 		naddr = sctp->sctp_saddrs[i].ipif_count;
1440 		for (l = 0; l < naddr; l++) {
1441 			sctp_ipif_t	*ipif;
1442 
1443 			ipif = obj->saddr_ipifp;
1444 			scanned++;
1445 
1446 			if (IN6_ARE_ADDR_EQUAL(&ipif->sctp_ipif_saddr,
1447 			    no_del_addr)) {
1448 				goto next_obj;
1449 			}
1450 
1451 			/*
1452 			 * Delete/mark dontsrc loopback/linklocal addresses and
1453 			 * unsupported address.
1454 			 * On a clustered node, we trust the clustering module
1455 			 * to do the right thing w.r.t loopback addresses, so
1456 			 * we ignore loopback addresses in this check.
1457 			 */
1458 			if ((SCTP_IS_IPIF_LOOPBACK(ipif) &&
1459 			    cl_sctp_check_addrs == NULL) ||
1460 			    SCTP_IS_IPIF_LINKLOCAL(ipif) ||
1461 			    SCTP_UNSUPP_AF(ipif, supp_af)) {
1462 				if (!delete) {
1463 					obj->saddr_ipif_unconfirmed = 1;
1464 					goto next_obj;
1465 				}
1466 				if (sctp->sctp_bound_to_all == 1)
1467 					sctp->sctp_bound_to_all = 0;
1468 				if (scanned < nsaddr) {
1469 					obj = list_next(&sctp->sctp_saddrs[i].
1470 					    sctp_ipif_list, obj);
1471 					sctp_ipif_hash_remove(sctp, ipif,
1472 					    B_TRUE);
1473 					continue;
1474 				}
1475 				sctp_ipif_hash_remove(sctp, ipif, B_TRUE);
1476 			}
1477 	next_obj:
1478 			if (scanned >= nsaddr) {
1479 				rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
1480 				return;
1481 			}
1482 			obj = list_next(&sctp->sctp_saddrs[i].sctp_ipif_list,
1483 			    obj);
1484 		}
1485 		rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
1486 	}
1487 }
1488 
1489 
1490 /* Get the first valid address from the list. Called with no locks held */
1491 in6_addr_t
1492 sctp_get_valid_addr(sctp_t *sctp, boolean_t isv6, boolean_t *addr_set)
1493 {
1494 	int			i;
1495 	int			l;
1496 	sctp_saddr_ipif_t	*obj;
1497 	int			scanned = 0;
1498 	in6_addr_t		addr;
1499 
1500 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1501 		rw_enter(&sctp->sctp_saddrs[i].ipif_hash_lock, RW_READER);
1502 		if (sctp->sctp_saddrs[i].ipif_count == 0) {
1503 			rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
1504 			continue;
1505 		}
1506 		obj = list_head(&sctp->sctp_saddrs[i].sctp_ipif_list);
1507 		for (l = 0; l < sctp->sctp_saddrs[i].ipif_count; l++) {
1508 			sctp_ipif_t	*ipif;
1509 
1510 			ipif = obj->saddr_ipifp;
1511 			if (!SCTP_DONT_SRC(obj) &&
1512 			    ipif->sctp_ipif_isv6 == isv6 &&
1513 			    ipif->sctp_ipif_state == SCTP_IPIFS_UP) {
1514 				*addr_set = B_TRUE;
1515 				rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
1516 				return (ipif->sctp_ipif_saddr);
1517 			}
1518 			scanned++;
1519 			if (scanned >= sctp->sctp_nsaddrs) {
1520 				rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
1521 				goto got_none;
1522 			}
1523 			obj = list_next(&sctp->sctp_saddrs[i].sctp_ipif_list,
1524 			    obj);
1525 		}
1526 		rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
1527 	}
1528 got_none:
1529 	/* Need to double check this */
1530 	if (isv6 == B_TRUE)
1531 		addr =  ipv6_all_zeros;
1532 	else
1533 		IN6_IPADDR_TO_V4MAPPED(0, &addr);
1534 	*addr_set = B_FALSE;
1535 	return (addr);
1536 }
1537 
1538 /*
1539  * Return the list of local addresses of an association.  The parameter
1540  * myaddrs is supposed to be either (struct sockaddr_in *) or (struct
1541  * sockaddr_in6 *) depending on the address family.
1542  */
1543 int
1544 sctp_getmyaddrs(void *conn, void *myaddrs, int *addrcnt)
1545 {
1546 	int			i;
1547 	int			l;
1548 	sctp_saddr_ipif_t	*obj;
1549 	sctp_t			*sctp = (sctp_t *)conn;
1550 	conn_t			*connp = sctp->sctp_connp;
1551 	int			family = connp->conn_family;
1552 	int			max = *addrcnt;
1553 	size_t			added = 0;
1554 	struct sockaddr_in6	*sin6;
1555 	struct sockaddr_in	*sin4;
1556 	int			scanned = 0;
1557 	boolean_t		skip_lback = B_FALSE;
1558 	ip_xmit_attr_t		*ixa = connp->conn_ixa;
1559 
1560 	if (sctp->sctp_nsaddrs == 0)
1561 		return (EINVAL);
1562 
1563 	/*
1564 	 * Skip loopback addresses for non-loopback assoc., ignore
1565 	 * this on a clustered node.
1566 	 */
1567 	if (sctp->sctp_state >= SCTPS_ESTABLISHED && !sctp->sctp_loopback &&
1568 	    (cl_sctp_check_addrs == NULL)) {
1569 		skip_lback = B_TRUE;
1570 	}
1571 
1572 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1573 		rw_enter(&sctp->sctp_saddrs[i].ipif_hash_lock, RW_READER);
1574 		if (sctp->sctp_saddrs[i].ipif_count == 0) {
1575 			rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
1576 			continue;
1577 		}
1578 		obj = list_head(&sctp->sctp_saddrs[i].sctp_ipif_list);
1579 		for (l = 0; l < sctp->sctp_saddrs[i].ipif_count; l++) {
1580 			sctp_ipif_t	*ipif = obj->saddr_ipifp;
1581 			in6_addr_t	addr = ipif->sctp_ipif_saddr;
1582 
1583 			scanned++;
1584 			if ((ipif->sctp_ipif_state == SCTP_IPIFS_CONDEMNED) ||
1585 			    SCTP_DONT_SRC(obj) ||
1586 			    (SCTP_IS_IPIF_LOOPBACK(ipif) && skip_lback)) {
1587 				if (scanned >= sctp->sctp_nsaddrs) {
1588 					rw_exit(&sctp->
1589 					    sctp_saddrs[i].ipif_hash_lock);
1590 					goto done;
1591 				}
1592 				obj = list_next(&sctp->sctp_saddrs[i].
1593 				    sctp_ipif_list, obj);
1594 				continue;
1595 			}
1596 			switch (family) {
1597 			case AF_INET:
1598 				sin4 = (struct sockaddr_in *)myaddrs + added;
1599 				sin4->sin_family = AF_INET;
1600 				sin4->sin_port = connp->conn_lport;
1601 				IN6_V4MAPPED_TO_INADDR(&addr, &sin4->sin_addr);
1602 				break;
1603 
1604 			case AF_INET6:
1605 				sin6 = (struct sockaddr_in6 *)myaddrs + added;
1606 				sin6->sin6_family = AF_INET6;
1607 				sin6->sin6_port = connp->conn_lport;
1608 				sin6->sin6_addr = addr;
1609 				/*
1610 				 * Note that flowinfo is only returned for
1611 				 * getpeername just like for TCP and UDP.
1612 				 */
1613 				sin6->sin6_flowinfo = 0;
1614 
1615 				if (IN6_IS_ADDR_LINKSCOPE(&sin6->sin6_addr) &&
1616 				    (ixa->ixa_flags & IXAF_SCOPEID_SET))
1617 					sin6->sin6_scope_id = ixa->ixa_scopeid;
1618 				else
1619 					sin6->sin6_scope_id = 0;
1620 				sin6->__sin6_src_id = 0;
1621 				break;
1622 			}
1623 			added++;
1624 			if (added >= max || scanned >= sctp->sctp_nsaddrs) {
1625 				rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
1626 				goto done;
1627 			}
1628 			obj = list_next(&sctp->sctp_saddrs[i].sctp_ipif_list,
1629 			    obj);
1630 		}
1631 		rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
1632 	}
1633 done:
1634 	*addrcnt = added;
1635 	return (0);
1636 }
1637 
1638 /*
1639  * Given the supported address family, walk through the source address list
1640  * and return the total length of the available addresses. If 'p' is not
1641  * null, construct the parameter list for the addresses in 'p'.
1642  * 'modify' will only be set when we want the source address list to
1643  * be modified. The source address list will be modified only when
1644  * generating an INIT chunk. For generating an INIT-ACK 'modify' will
1645  * be false since the 'sctp' will be that of the listener.
1646  */
1647 size_t
1648 sctp_saddr_info(sctp_t *sctp, int supp_af, uchar_t *p, boolean_t modify)
1649 {
1650 	int			i;
1651 	int			l;
1652 	sctp_saddr_ipif_t	*obj;
1653 	size_t			paramlen = 0;
1654 	sctp_parm_hdr_t		*hdr;
1655 	int			scanned = 0;
1656 	int			naddr;
1657 	int			nsaddr;
1658 	boolean_t		del_ll = B_FALSE;
1659 	boolean_t		del_lb = B_FALSE;
1660 
1661 
1662 	/*
1663 	 * On a clustered node don't bother changing anything
1664 	 * on the loopback interface.
1665 	 */
1666 	if (modify && !sctp->sctp_loopback && (cl_sctp_check_addrs == NULL))
1667 		del_lb = B_TRUE;
1668 
1669 	if (modify && !sctp->sctp_linklocal)
1670 		del_ll = B_TRUE;
1671 
1672 	nsaddr = sctp->sctp_nsaddrs;
1673 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
1674 		rw_enter(&sctp->sctp_saddrs[i].ipif_hash_lock, RW_WRITER);
1675 		if (sctp->sctp_saddrs[i].ipif_count == 0) {
1676 			rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
1677 			continue;
1678 		}
1679 		obj = list_head(&sctp->sctp_saddrs[i].sctp_ipif_list);
1680 		naddr = sctp->sctp_saddrs[i].ipif_count;
1681 		for (l = 0; l < naddr; l++) {
1682 			in6_addr_t	addr;
1683 			sctp_ipif_t	*ipif;
1684 			boolean_t	ipif_lb;
1685 			boolean_t	ipif_ll;
1686 			boolean_t	unsupp_af;
1687 
1688 			ipif = obj->saddr_ipifp;
1689 			scanned++;
1690 
1691 			ipif_lb = SCTP_IS_IPIF_LOOPBACK(ipif);
1692 			ipif_ll = SCTP_IS_IPIF_LINKLOCAL(ipif);
1693 			unsupp_af = SCTP_UNSUPP_AF(ipif, supp_af);
1694 			/*
1695 			 * We need to either delete or skip loopback/linklocal
1696 			 * or unsupported addresses, if required.
1697 			 */
1698 			if ((ipif_ll && del_ll) || (ipif_lb && del_lb) ||
1699 			    (unsupp_af && modify)) {
1700 				if (sctp->sctp_bound_to_all == 1)
1701 					sctp->sctp_bound_to_all = 0;
1702 				if (scanned < nsaddr) {
1703 					obj = list_next(&sctp->sctp_saddrs[i].
1704 					    sctp_ipif_list, obj);
1705 					sctp_ipif_hash_remove(sctp, ipif,
1706 					    B_TRUE);
1707 					continue;
1708 				}
1709 				sctp_ipif_hash_remove(sctp, ipif, B_TRUE);
1710 
1711 				goto next_addr;
1712 			} else if (ipif_ll || unsupp_af ||
1713 			    (ipif_lb && (cl_sctp_check_addrs == NULL))) {
1714 				goto next_addr;
1715 			}
1716 
1717 			if (!SCTP_IPIF_USABLE(ipif->sctp_ipif_state))
1718 				goto next_addr;
1719 			if (p != NULL)
1720 				hdr = (sctp_parm_hdr_t *)(p + paramlen);
1721 			addr = ipif->sctp_ipif_saddr;
1722 			if (!ipif->sctp_ipif_isv6) {
1723 				struct in_addr	*v4;
1724 
1725 				if (p != NULL) {
1726 					hdr->sph_type = htons(PARM_ADDR4);
1727 					hdr->sph_len = htons(PARM_ADDR4_LEN);
1728 					v4 = (struct in_addr *)(hdr + 1);
1729 					IN6_V4MAPPED_TO_INADDR(&addr, v4);
1730 				}
1731 				paramlen += PARM_ADDR4_LEN;
1732 			} else {
1733 				if (p != NULL) {
1734 					hdr->sph_type = htons(PARM_ADDR6);
1735 					hdr->sph_len = htons(PARM_ADDR6_LEN);
1736 					bcopy(&addr, hdr + 1, sizeof (addr));
1737 				}
1738 				paramlen += PARM_ADDR6_LEN;
1739 			}
1740 next_addr:
1741 			if (scanned >= nsaddr) {
1742 				rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
1743 				return (paramlen);
1744 			}
1745 			obj = list_next(&sctp->sctp_saddrs[i].sctp_ipif_list,
1746 			    obj);
1747 		}
1748 		rw_exit(&sctp->sctp_saddrs[i].ipif_hash_lock);
1749 	}
1750 	return (paramlen);
1751 }
1752 
1753 /*
1754  * This is used on a clustered node to obtain a list of addresses, the list
1755  * consists of sockaddr_in structs for v4 and sockaddr_in6 for v6. The list
1756  * is then passed onto the clustering module which sends back the correct
1757  * list based on the port info. Regardless of the input, i.e INADDR_ANY
1758  * or specific address(es), we create the list since it could be modified by
1759  * the clustering module. When given a list of addresses, we simply
1760  * create the list of sockaddr_in or sockaddr_in6 structs using those
1761  * addresses. If there is an INADDR_ANY in the input list, or if the
1762  * input is INADDR_ANY, we create a list of sockaddr_in or sockaddr_in6
1763  * structs consisting all the addresses in the global interface list
1764  * except those that are hosted on the loopback interface. We create
1765  * a list of sockaddr_in[6] structs just so that it can be directly input
1766  * to sctp_valid_addr_list() once the clustering module has processed it.
1767  */
1768 int
1769 sctp_get_addrlist(sctp_t *sctp, const void *addrs, uint32_t *addrcnt,
1770     uchar_t **addrlist, int *uspec, size_t *size)
1771 {
1772 	int			cnt;
1773 	int			icnt;
1774 	sctp_ipif_t		*sctp_ipif;
1775 	struct sockaddr_in	*s4;
1776 	struct sockaddr_in6	*s6;
1777 	uchar_t			*p;
1778 	int			err = 0;
1779 	sctp_stack_t		*sctps = sctp->sctp_sctps;
1780 	conn_t			*connp = sctp->sctp_connp;
1781 
1782 	*addrlist = NULL;
1783 	*size = 0;
1784 
1785 	/*
1786 	 * Create a list of sockaddr_in[6] structs using the input list.
1787 	 */
1788 	if (connp->conn_family == AF_INET) {
1789 		*size = sizeof (struct sockaddr_in) * *addrcnt;
1790 		*addrlist = kmem_zalloc(*size,  KM_SLEEP);
1791 		p = *addrlist;
1792 		for (cnt = 0; cnt < *addrcnt; cnt++) {
1793 			s4 = (struct sockaddr_in *)addrs + cnt;
1794 			/*
1795 			 * We need to create a list of all the available
1796 			 * addresses if there is an INADDR_ANY. However,
1797 			 * if we are beyond LISTEN, then this is invalid
1798 			 * (see sctp_valid_addr_list(). So, we just fail
1799 			 * it here rather than wait till it fails in
1800 			 * sctp_valid_addr_list().
1801 			 */
1802 			if (s4->sin_addr.s_addr == INADDR_ANY) {
1803 				kmem_free(*addrlist, *size);
1804 				*addrlist = NULL;
1805 				*size = 0;
1806 				if (sctp->sctp_state > SCTPS_LISTEN) {
1807 					*addrcnt = 0;
1808 					return (EINVAL);
1809 				}
1810 				if (uspec != NULL)
1811 					*uspec = 1;
1812 				goto get_all_addrs;
1813 			} else {
1814 				bcopy(s4, p, sizeof (*s4));
1815 				p += sizeof (*s4);
1816 			}
1817 		}
1818 	} else {
1819 		*size = sizeof (struct sockaddr_in6) * *addrcnt;
1820 		*addrlist = kmem_zalloc(*size, KM_SLEEP);
1821 		p = *addrlist;
1822 		for (cnt = 0; cnt < *addrcnt; cnt++) {
1823 			s6 = (struct sockaddr_in6 *)addrs + cnt;
1824 			/*
1825 			 * Comments for INADDR_ANY, above, apply here too.
1826 			 */
1827 			if (IN6_IS_ADDR_UNSPECIFIED(&s6->sin6_addr)) {
1828 				kmem_free(*addrlist, *size);
1829 				*size = 0;
1830 				*addrlist = NULL;
1831 				if (sctp->sctp_state > SCTPS_LISTEN) {
1832 					*addrcnt = 0;
1833 					return (EINVAL);
1834 				}
1835 				if (uspec != NULL)
1836 					*uspec = 1;
1837 				goto get_all_addrs;
1838 			} else {
1839 				bcopy(addrs, p, sizeof (*s6));
1840 				p += sizeof (*s6);
1841 			}
1842 		}
1843 	}
1844 	return (err);
1845 get_all_addrs:
1846 
1847 	/*
1848 	 * Allocate max possible size. We allocate the max. size here because
1849 	 * the clustering module could end up adding addresses to the list.
1850 	 * We allocate upfront so that the clustering module need to bother
1851 	 * re-sizing the list.
1852 	 */
1853 	if (connp->conn_family == AF_INET) {
1854 		*size = sizeof (struct sockaddr_in) *
1855 		    sctps->sctps_g_ipifs_count;
1856 	} else {
1857 		*size = sizeof (struct sockaddr_in6) *
1858 		    sctps->sctps_g_ipifs_count;
1859 	}
1860 	*addrlist = kmem_zalloc(*size, KM_SLEEP);
1861 	*addrcnt = 0;
1862 	p = *addrlist;
1863 	rw_enter(&sctps->sctps_g_ipifs_lock, RW_READER);
1864 
1865 	/*
1866 	 * Walk through the global interface list and add all addresses,
1867 	 * except those that are hosted on loopback interfaces.
1868 	 */
1869 	for (cnt = 0; cnt <  SCTP_IPIF_HASH; cnt++) {
1870 		if (sctps->sctps_g_ipifs[cnt].ipif_count == 0)
1871 			continue;
1872 		sctp_ipif = list_head(
1873 		    &sctps->sctps_g_ipifs[cnt].sctp_ipif_list);
1874 		for (icnt = 0;
1875 		    icnt < sctps->sctps_g_ipifs[cnt].ipif_count;
1876 		    icnt++) {
1877 			in6_addr_t	addr;
1878 
1879 			rw_enter(&sctp_ipif->sctp_ipif_lock, RW_READER);
1880 			addr = sctp_ipif->sctp_ipif_saddr;
1881 			if (SCTP_IPIF_DISCARD(sctp_ipif->sctp_ipif_flags) ||
1882 			    !SCTP_IPIF_USABLE(sctp_ipif->sctp_ipif_state) ||
1883 			    SCTP_IS_IPIF_LOOPBACK(sctp_ipif) ||
1884 			    SCTP_IS_IPIF_LINKLOCAL(sctp_ipif) ||
1885 			    !SCTP_IPIF_ZONE_MATCH(sctp, sctp_ipif) ||
1886 			    (connp->conn_family == AF_INET &&
1887 			    sctp_ipif->sctp_ipif_isv6) ||
1888 			    (sctp->sctp_connp->conn_ipv6_v6only &&
1889 			    !sctp_ipif->sctp_ipif_isv6)) {
1890 				rw_exit(&sctp_ipif->sctp_ipif_lock);
1891 				sctp_ipif = list_next(
1892 				    &sctps->sctps_g_ipifs[cnt].sctp_ipif_list,
1893 				    sctp_ipif);
1894 				continue;
1895 			}
1896 			rw_exit(&sctp_ipif->sctp_ipif_lock);
1897 			if (connp->conn_family == AF_INET) {
1898 				s4 = (struct sockaddr_in *)p;
1899 				IN6_V4MAPPED_TO_INADDR(&addr, &s4->sin_addr);
1900 				s4->sin_family = AF_INET;
1901 				p += sizeof (*s4);
1902 			} else {
1903 				s6 = (struct sockaddr_in6 *)p;
1904 				s6->sin6_addr = addr;
1905 				s6->sin6_family = AF_INET6;
1906 				s6->sin6_scope_id =
1907 				    sctp_ipif->sctp_ipif_ill->sctp_ill_index;
1908 				p += sizeof (*s6);
1909 			}
1910 			(*addrcnt)++;
1911 			sctp_ipif = list_next(
1912 			    &sctps->sctps_g_ipifs[cnt].sctp_ipif_list,
1913 			    sctp_ipif);
1914 		}
1915 	}
1916 	rw_exit(&sctps->sctps_g_ipifs_lock);
1917 	return (err);
1918 }
1919 
1920 /*
1921  * Get a list of addresses from the source address list. The  caller is
1922  * responsible for allocating sufficient buffer for this.
1923  */
1924 void
1925 sctp_get_saddr_list(sctp_t *sctp, uchar_t *p, size_t psize)
1926 {
1927 	int			cnt;
1928 	int			icnt;
1929 	sctp_saddr_ipif_t	*obj;
1930 	int			naddr;
1931 	int			scanned = 0;
1932 
1933 	for (cnt = 0; cnt < SCTP_IPIF_HASH; cnt++) {
1934 		rw_enter(&sctp->sctp_saddrs[cnt].ipif_hash_lock, RW_READER);
1935 		if (sctp->sctp_saddrs[cnt].ipif_count == 0) {
1936 			rw_exit(&sctp->sctp_saddrs[cnt].ipif_hash_lock);
1937 			continue;
1938 		}
1939 		obj = list_head(&sctp->sctp_saddrs[cnt].sctp_ipif_list);
1940 		naddr = sctp->sctp_saddrs[cnt].ipif_count;
1941 		for (icnt = 0; icnt < naddr; icnt++) {
1942 			sctp_ipif_t	*ipif;
1943 
1944 			if (psize < sizeof (ipif->sctp_ipif_saddr)) {
1945 				rw_exit(&sctp->sctp_saddrs[cnt].ipif_hash_lock);
1946 				return;
1947 			}
1948 
1949 			scanned++;
1950 			ipif = obj->saddr_ipifp;
1951 			bcopy(&ipif->sctp_ipif_saddr, p,
1952 			    sizeof (ipif->sctp_ipif_saddr));
1953 			p += sizeof (ipif->sctp_ipif_saddr);
1954 			psize -= sizeof (ipif->sctp_ipif_saddr);
1955 			if (scanned >= sctp->sctp_nsaddrs) {
1956 				rw_exit(&sctp->sctp_saddrs[cnt].ipif_hash_lock);
1957 				return;
1958 			}
1959 			obj = list_next(
1960 			    &sctp->sctp_saddrs[icnt].sctp_ipif_list,
1961 			    obj);
1962 		}
1963 		rw_exit(&sctp->sctp_saddrs[cnt].ipif_hash_lock);
1964 	}
1965 }
1966 
1967 /*
1968  * Get a list of addresses from the remote address list. The  caller is
1969  * responsible for allocating sufficient buffer for this.
1970  */
1971 void
1972 sctp_get_faddr_list(sctp_t *sctp, uchar_t *p, size_t psize)
1973 {
1974 	sctp_faddr_t	*fp;
1975 
1976 	for (fp = sctp->sctp_faddrs; fp != NULL; fp = fp->sf_next) {
1977 		if (psize < sizeof (fp->sf_faddr))
1978 			return;
1979 		bcopy(&fp->sf_faddr, p, sizeof (fp->sf_faddr));
1980 		p += sizeof (fp->sf_faddr);
1981 		psize -= sizeof (fp->sf_faddr);
1982 	}
1983 }
1984 
1985 static void
1986 sctp_free_ills(sctp_stack_t *sctps)
1987 {
1988 	int			i;
1989 	int			l;
1990 	sctp_ill_t	*sctp_ill;
1991 
1992 	if (sctps->sctps_ills_count == 0)
1993 		return;
1994 
1995 	for (i = 0; i < SCTP_ILL_HASH; i++) {
1996 		sctp_ill = list_tail(&sctps->sctps_g_ills[i].sctp_ill_list);
1997 		for (l = 0; l < sctps->sctps_g_ills[i].ill_count; l++) {
1998 			ASSERT(sctp_ill->sctp_ill_ipifcnt == 0);
1999 			list_remove(&sctps->sctps_g_ills[i].sctp_ill_list,
2000 			    sctp_ill);
2001 			sctps->sctps_ills_count--;
2002 			kmem_free(sctp_ill->sctp_ill_name,
2003 			    sctp_ill->sctp_ill_name_length);
2004 			kmem_free(sctp_ill, sizeof (sctp_ill_t));
2005 			sctp_ill =
2006 			    list_tail(&sctps->sctps_g_ills[i].sctp_ill_list);
2007 		}
2008 		sctps->sctps_g_ills[i].ill_count = 0;
2009 	}
2010 	ASSERT(sctps->sctps_ills_count == 0);
2011 }
2012 
2013 static void
2014 sctp_free_ipifs(sctp_stack_t *sctps)
2015 {
2016 	int			i;
2017 	int			l;
2018 	sctp_ipif_t	*sctp_ipif;
2019 	sctp_ill_t	*sctp_ill;
2020 
2021 	if (sctps->sctps_g_ipifs_count == 0)
2022 		return;
2023 
2024 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
2025 		sctp_ipif = list_tail(&sctps->sctps_g_ipifs[i].sctp_ipif_list);
2026 		for (l = 0; l < sctps->sctps_g_ipifs[i].ipif_count; l++) {
2027 			sctp_ill = sctp_ipif->sctp_ipif_ill;
2028 
2029 			list_remove(&sctps->sctps_g_ipifs[i].sctp_ipif_list,
2030 			    sctp_ipif);
2031 			sctps->sctps_g_ipifs_count--;
2032 			atomic_dec_32(&sctp_ill->sctp_ill_ipifcnt);
2033 			kmem_free(sctp_ipif, sizeof (sctp_ipif_t));
2034 			sctp_ipif =
2035 			    list_tail(&sctps->sctps_g_ipifs[i].sctp_ipif_list);
2036 		}
2037 		sctps->sctps_g_ipifs[i].ipif_count = 0;
2038 	}
2039 	ASSERT(sctps->sctps_g_ipifs_count == 0);
2040 }
2041 
2042 
2043 /* Initialize the SCTP ILL list and lock */
2044 void
2045 sctp_saddr_init(sctp_stack_t *sctps)
2046 {
2047 	int	i;
2048 
2049 	sctps->sctps_g_ills = kmem_zalloc(sizeof (sctp_ill_hash_t) *
2050 	    SCTP_ILL_HASH, KM_SLEEP);
2051 	sctps->sctps_g_ipifs = kmem_zalloc(sizeof (sctp_ipif_hash_t) *
2052 	    SCTP_IPIF_HASH, KM_SLEEP);
2053 
2054 	rw_init(&sctps->sctps_g_ills_lock, NULL, RW_DEFAULT, NULL);
2055 	rw_init(&sctps->sctps_g_ipifs_lock, NULL, RW_DEFAULT, NULL);
2056 
2057 	for (i = 0; i < SCTP_ILL_HASH; i++) {
2058 		sctps->sctps_g_ills[i].ill_count = 0;
2059 		list_create(&sctps->sctps_g_ills[i].sctp_ill_list,
2060 		    sizeof (sctp_ill_t),
2061 		    offsetof(sctp_ill_t, sctp_ills));
2062 	}
2063 	for (i = 0; i < SCTP_IPIF_HASH; i++) {
2064 		sctps->sctps_g_ipifs[i].ipif_count = 0;
2065 		list_create(&sctps->sctps_g_ipifs[i].sctp_ipif_list,
2066 		    sizeof (sctp_ipif_t), offsetof(sctp_ipif_t, sctp_ipifs));
2067 	}
2068 }
2069 
2070 void
2071 sctp_saddr_fini(sctp_stack_t *sctps)
2072 {
2073 	int	i;
2074 
2075 	sctp_free_ipifs(sctps);
2076 	sctp_free_ills(sctps);
2077 
2078 	for (i = 0; i < SCTP_ILL_HASH; i++)
2079 		list_destroy(&sctps->sctps_g_ills[i].sctp_ill_list);
2080 	for (i = 0; i < SCTP_IPIF_HASH; i++)
2081 		list_destroy(&sctps->sctps_g_ipifs[i].sctp_ipif_list);
2082 
2083 	ASSERT(sctps->sctps_ills_count == 0 && sctps->sctps_g_ipifs_count == 0);
2084 	kmem_free(sctps->sctps_g_ills, sizeof (sctp_ill_hash_t) *
2085 	    SCTP_ILL_HASH);
2086 	sctps->sctps_g_ills = NULL;
2087 	kmem_free(sctps->sctps_g_ipifs, sizeof (sctp_ipif_hash_t) *
2088 	    SCTP_IPIF_HASH);
2089 	sctps->sctps_g_ipifs = NULL;
2090 	rw_destroy(&sctps->sctps_g_ills_lock);
2091 	rw_destroy(&sctps->sctps_g_ipifs_lock);
2092 }
2093